Skip to main content

Energy Efficient Approach to Detect Sinkhole Attack Using Roving IDS in 6LoWPAN Network

  • Conference paper
  • First Online:
Innovations for Community Services (I4CS 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1139))

Included in the following conference series:

Abstract

The Internet of Things (IoT) has become a widespread technology where everyday objects are being transferred toward intelligent devices. These smart devices incorporate sensing, computing, and networking abilities into them. A smartphone, a smartwatch can be utilized for various tasks other than calling and timekeeping. Even home appliances also incorporate a midrange computer. Therefore, the most advanced applications and services have considerably risen. Despite numerous gains, security threats increased in terms of recorded catastrophic events as well as attack severity. There are multiple threads in 6LoWPAN and related routing protocol. In our research paper, we perform and assess an energy-efficient, lightweight intrusion detection system (IDS) for the 6LoWPAN network. The primary goal of this paper to target routing attacks (i.e., selective-forwarding, sinkhole, etc.). Our intended energy-efficient lightweight defense solution which identifies sinkhole attack in the IoT ecosystem. The defense method is executed with the help of Cooja network simulator on the Contiki OS. The experimental outcomes show that the solution is lightweight and can identify the sinkhole attack with a noteworthy performance, and provides 95.86% TPR and 94.31% TNR rate. It also shows minimum memory (RAM/ROM) utilization and energy consumption, which is comparable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sharma, N., Shamkuwar, M., Singh, I.: The history, present and future with IoT. In: Balas, V.E., Solanki, V.K., Kumar, R., Khari, M. (eds.) Internet of Things and Big Data Analytics for Smart Generation. ISRL, vol. 154, pp. 27–51. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-04203-5_3

    Chapter  Google Scholar 

  2. Sharma, S., Chang, V., Tim, U.S., Wong, J., Gadia, S.: Cloud and IoT-based emerging services systems. Cluster Comput. 22(1), 71–91 (2019)

    Article  Google Scholar 

  3. Mekki, K., Bajic, E., Chaxel, F., Meyer, F.: A comparative study of LPWAN technologies for large-scale IoT deployment. ICT Express 5(1), 1–7 (2019)

    Article  Google Scholar 

  4. Cisco: IoT to drive growth in connected devices through 2022. https://www.zdnet.com/article/iot-to-drive-growth-in-connected-devices-through-2022-cisco/. Accessed 26 July 2019

  5. Cold in Finland: Five nightmarish attacks that show the risks of IoT security. https://www.zdnet.com/article/5-nightmarish-attacks-that-show-the-risks-of-iot-security/. Accessed 26 July 2019

  6. Mirai-Botnet: Mirai Botnet DDoS. https://www.zdnet.com/article/5-nightmarish-attacks-that-show-the-risks-of-iot-security/. Accessed 26 July 2019

  7. Passos, L., et al.: A study of feature scattering in the Linux kernel. IEEE Trans. Softw. Eng. (2018)

    Google Scholar 

  8. Gershuni, E., et al.: Simple and precise static analysis of untrusted Linux kernel extensions. In: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 1069–1084. ACM (2019)

    Google Scholar 

  9. Krčo, S., Pokrić, B., Carrez, F.: Designing IoT architecture(s): a European perspective. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 79–84. IEEE (2014)

    Google Scholar 

  10. Radanliev, P., De Roure, D., Nicolescu, R., Huth, M.: A reference architecture for integrating the industrial Internet of Things in the industry 4.0. arXiv preprint arXiv:1903.04369 (2019)

  11. Airehrour, D., Gutierrez, J.A., Ray, S.K.: SecTrust-RPL: a secure trust-aware RPL routing protocol for Internet of Things. Future Gener. Comput. Syst. 93, 860–876 (2019)

    Article  Google Scholar 

  12. Raoof, A., Matrawy, A., Lung, C.H.: Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Commun. Surv. Tutor. 21(2), 1582–1606 (2018)

    Article  Google Scholar 

  13. Zikria, Y.B., Afzal, M.K., Ishmanov, F., Kim, S.W., Yu, H.: A survey on routing protocols supported by the Contiki Internet of Things operating system. Future Gener. Comput. Syst. 82, 200–219 (2018)

    Article  Google Scholar 

  14. IoT-Simulator: Cooja. https://anrg.usc.edu/contiki/index.php/CoojaSimulator. Accessed 29 July 2019

  15. Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)

    Article  Google Scholar 

  16. Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2013)

    Article  Google Scholar 

  17. Khandelwal, M., Gupta, D.K., Bhale, P.: DoS attack detection technique using back propagation neural network. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1064–1068. IEEE (2016)

    Google Scholar 

  18. Agrawal, N., Pradeepkumar, B., Tapaswi, S.: Preventing ARP spoofing in WLAN using SHA-512. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–5. IEEE (2013)

    Google Scholar 

  19. Anantvalee, T., Wu, J.: A survey on intrusion detection in mobile ad hoc networks. In: Xiao, Y., Shen, X.S., Du, D.Z. (eds.) Wireless Network Security. SCT, pp. 159–180. Springer, Boston (2007). https://doi.org/10.1007/978-0-387-33112-6_7

    Chapter  Google Scholar 

  20. Le, A., Loo, J., Luo, Y., Lasebae, A.: Specification-based IDS for securing RPL from topology attacks. In: 2011 IFIP Wireless Days (WD), pp. 1–3. IEEE (2011)

    Google Scholar 

  21. Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Netw. 9(8), 794326 (2013)

    Article  Google Scholar 

  22. Pongle, P., Chavan, G.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), pp. 1–6. IEEE (2015)

    Google Scholar 

  23. Cervantes, C., Poplade, D., Nogueira, M., Santos, A.: Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 606–611. IEEE (2015)

    Google Scholar 

  24. Glissa, G., Rachedi, A., Meddeb, A.: A secure routing protocol based on RPL for Internet of Things. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1–7. IEEE (2016)

    Google Scholar 

  25. Hatzivasilis, G., Papaefstathiou, I., Manifavas, C.: SCOTRES: secure routing for IoT and CPS. IEEE Internet Things J. 4(6), 2129–2141 (2017)

    Article  Google Scholar 

  26. Raoof, A., Matrawy, A., Lung, C.H.: Secure routing in IoT: evaluation of RPL secure mode under attacks. arXiv preprint arXiv:1905.10314 (2019)

  27. Kamble, A., Malemath, V.S., Patil, D.: Security attacks and secure routing protocols in RPL-based Internet of Things: survey. In: 2017 International Conference on Emerging Trends and Innovation in ICT (ICEI), pp. 33–39. IEEE (2017)

    Google Scholar 

  28. Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661–2674 (2013)

    Article  Google Scholar 

  29. Thamilarasu, G., Chawla, S.: Towards deep-learning-driven intrusion detection for the Internet of Things. Sensors 19(9), 1977 (2019)

    Article  Google Scholar 

Download references

Acknowledgments

We thank the anonymous reviewers for their helpful feedback that served to improve this paper. The research work has been conducted under Information Security Education and Awareness (ISEA) Project Phase - II. The authors would like to thank MeitY and IIT Guwahati India, for the support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pradeepkumar Bhale .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bhale, P., Dey, S., Biswas, S., Nandi, S. (2020). Energy Efficient Approach to Detect Sinkhole Attack Using Roving IDS in 6LoWPAN Network. In: Rautaray, S., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2020. Communications in Computer and Information Science, vol 1139. Springer, Cham. https://doi.org/10.1007/978-3-030-37484-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37484-6_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37483-9

  • Online ISBN: 978-3-030-37484-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics