Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP
The rapid growth of the Internet of Things (IoT) and the massive propagation of wireless technologies has revealed recent opportunities for development in various domains of real life, such as smart cities and E-Health applications. A slight defense against different forms of attack is offered for t...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-10-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/20/21/5997 |
_version_ | 1797550093619953664 |
---|---|
author | Zahrah A. Almusaylim NZ Jhanjhi Abdulaziz Alhumam |
author_facet | Zahrah A. Almusaylim NZ Jhanjhi Abdulaziz Alhumam |
author_sort | Zahrah A. Almusaylim |
collection | DOAJ |
description | The rapid growth of the Internet of Things (IoT) and the massive propagation of wireless technologies has revealed recent opportunities for development in various domains of real life, such as smart cities and E-Health applications. A slight defense against different forms of attack is offered for the current secure and lightweight Routing Protocol for Low Power and Lossy Networks (RPL) of IoT resource-constrained devices. Data packets are highly likely to be exposed in transmission during data packet routing. The RPL rank and version number attacks, which are two forms of RPL attacks, can have critical consequences for RPL networks. The studies conducted on these attacks have several security defects and performance shortcomings. In this research, we propose a Secure RPL Routing Protocol (SRPL-RP) for rank and version number attacks. This mainly detects, mitigates, and isolates attacks in RPL networks. The detection is based on a comparison of the rank strategy. The mitigation uses threshold and attack status tables, and the isolation adds them to a blacklist table and alerts nodes to skip them. SRPL-RP supports diverse types of network topologies and is comprehensively analyzed with multiple studies, such as Standard RPL with Attacks, Sink-Based Intrusion Detection Systems (SBIDS), and RPL+Shield. The analysis results showed that the SRPL-RP achieved significant improvements with a Packet Delivery Ratio (PDR) of 98.48%, a control message value of 991 packets/s, and an average energy consumption of 1231.75 joules. SRPL-RP provided a better accuracy rate of 98.30% under the attacks. |
first_indexed | 2024-03-10T15:24:33Z |
format | Article |
id | doaj.art-5e542a8c27624b7cb6111cc2a856ec1c |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-10T15:24:33Z |
publishDate | 2020-10-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-5e542a8c27624b7cb6111cc2a856ec1c2023-11-20T18:12:17ZengMDPI AGSensors1424-82202020-10-012021599710.3390/s20215997Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RPZahrah A. Almusaylim0NZ Jhanjhi1Abdulaziz Alhumam2Department of Computer Science, College of Computer Science & IT, King Faisal University, 31982 Al-Hasa, Saudi ArabiaSchool of Computer Science and Engineering (SCE), Taylor’s University, Lakeside Campus, Subang Jaya 47500, MalaysiaDepartment of Computer Science, College of Computer Science & IT, King Faisal University, 31982 Al-Hasa, Saudi ArabiaThe rapid growth of the Internet of Things (IoT) and the massive propagation of wireless technologies has revealed recent opportunities for development in various domains of real life, such as smart cities and E-Health applications. A slight defense against different forms of attack is offered for the current secure and lightweight Routing Protocol for Low Power and Lossy Networks (RPL) of IoT resource-constrained devices. Data packets are highly likely to be exposed in transmission during data packet routing. The RPL rank and version number attacks, which are two forms of RPL attacks, can have critical consequences for RPL networks. The studies conducted on these attacks have several security defects and performance shortcomings. In this research, we propose a Secure RPL Routing Protocol (SRPL-RP) for rank and version number attacks. This mainly detects, mitigates, and isolates attacks in RPL networks. The detection is based on a comparison of the rank strategy. The mitigation uses threshold and attack status tables, and the isolation adds them to a blacklist table and alerts nodes to skip them. SRPL-RP supports diverse types of network topologies and is comprehensively analyzed with multiple studies, such as Standard RPL with Attacks, Sink-Based Intrusion Detection Systems (SBIDS), and RPL+Shield. The analysis results showed that the SRPL-RP achieved significant improvements with a Packet Delivery Ratio (PDR) of 98.48%, a control message value of 991 packets/s, and an average energy consumption of 1231.75 joules. SRPL-RP provided a better accuracy rate of 98.30% under the attacks.https://www.mdpi.com/1424-8220/20/21/5997IoTsecurityRPLrank attackversion number attack |
spellingShingle | Zahrah A. Almusaylim NZ Jhanjhi Abdulaziz Alhumam Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP Sensors IoT security RPL rank attack version number attack |
title | Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP |
title_full | Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP |
title_fullStr | Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP |
title_full_unstemmed | Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP |
title_short | Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP |
title_sort | detection and mitigation of rpl rank and version number attacks in the internet of things srpl rp |
topic | IoT security RPL rank attack version number attack |
url | https://www.mdpi.com/1424-8220/20/21/5997 |
work_keys_str_mv | AT zahrahaalmusaylim detectionandmitigationofrplrankandversionnumberattacksintheinternetofthingssrplrp AT nzjhanjhi detectionandmitigationofrplrankandversionnumberattacksintheinternetofthingssrplrp AT abdulazizalhumam detectionandmitigationofrplrankandversionnumberattacksintheinternetofthingssrplrp |