Skip to main content

Advertisement

Log in

Design and Implementation of a Lightweight Mitigation Solution for Addressing Network Partitioning Attack Against RPL Protocol

  • Research
  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Routing protocol for low-power and lossy networks (RPL) is the standard routing protocol specified by the Internet engineering task force (IETF) for Low power and lossy Nnetworks (LLNs) based Internet of Things (IoT) applications. Although RPL gives many benefits to LLNs, due to the resource-constrained and easily tamperable nature of LLN devices, LLNs are vulnerable to a wide range of attacks that primarily alter the functioning of the RPL. One such attack is known as a Network partitioning attack (NPA). An NPA in RPL occurs when an attacker node intentionally divides a network into disjoint segments, preventing communication between nodes that may be previously able to communicate. This can happen when an attacker does not complete the route registration step at the root node, exploits the rank property of RPL, and continues the standard Destination advertisement object (DAO) forwarding technique of RPL during the node joining and DAG maintenance phase. Consequently, it segregates the section of nodes from the root node. In the literature, Enhanced-RPL (ERPL) is the only solution proposed to address NPA. However, our study shows that ERPL further induces fake Destination Advertisement Object Acknowledgement (DAO-ACK) and dropping DAO Attack, making it unsuitable for deployment in real-world applications. Our analysis indicates that the performance metrics of the network are not improved with the existing mitigation technique when the attacker unicasts fake DAO-ACK packets to victim client nodes. Our key idea is to improve the existing mitigation technique (ERPL) to incorporate an effective NPA detection approach that authenticates the DAO-ACK packet sent from parent nodes to client nodes. Our proposed approach, SecRPLNPA, has been integrated and thoroughly tested using the Cooja simulator. We have conducted a performance assessment of SecRPLNPA comparing it against standard RPL and ERPL. Our empirical results suggest that in both stationary and mobile scenarios, SecRPLNPA proficiently detects and mitigates Network Partitioning Attacks while causing only minimal impact on resource-constrained nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Algorithm 1
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data Availability

Data available on request from the authors.

Abbreviations

OSPF:

Open shortest path first

IETF:

Internet engineering task force

6LoWPAN:

IPv6 over low-power wireless personal area networks

IoT:

Internet of Things

LLN:

Low-power and lossy network

DIS:

DODAG information solicitation

AODV:

Adhoc on-demand distance vector

DODAG:

Destination oriented directed acyclic graph

DAO:

Destination advertisement object

RPL:

Routing protocol for low power and lossy networks

DIO:

DODAG information object

NPA:

Network partitioning attack

ERPL:

Enhanced-RPL

OF:

Objective functions

DAO-ACK:

Destination advertisement object-acknowledgment

MRHOF:

Minimum rank with hysteresis objective function

NS:

Non-storing

References

  1. Espinoza, H., Kling, G., McGroarty, F., O’Mahony, M., & Ziouvelou, X. (2020). Estimating the impact of the Internet of Things on productivity in Europe. Heliyon, 6(5), 03935.

    Article  Google Scholar 

  2. Safaei, B., Monazzah, A. M. H., & Ejlali, A. (2021). ELITE: An elaborated cross-layer RPL objective function to achieve energy efficiency in Internet-of-Things devices. IEEE Internet of Things Journal, 8(2), 1169–1182.

    Article  MATH  Google Scholar 

  3. Napiah, M. N., Bin Idris, M. Y. I., Ramli, R., & Ahmedy, I. (2018). Compression header analyzer intrusion detection system (CHA - IDS) for 6LoWPAN communication protocol. IEEE Access, 6, 16623–16638.

    Article  Google Scholar 

  4. Mayzaud, A., Badonnel, R., & Chrisment, I. (2016). A taxonomy of attacks in RPL-based Internet of Things. International Journal of Network Security, 18(3), 459–473.

    MATH  Google Scholar 

  5. Murali, S., & Jamalipour, A. (2020). A lightweight intrusion detection for Sybil attack under mobile RPL in the Internet of Things. IEEE Internet of Things Journal, 7(1), 379–388.

    Article  MATH  Google Scholar 

  6. Sharma, G., Grover, J., & Verma, A. (2023). Performance evaluation of mobile RPL-based IoT networks under version number attack. Computer Communications, 197, 12–22.

    Article  MATH  Google Scholar 

  7. Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure routing for Internet of Things: A survey. Journal of Network and Computer Applications, 66, 198–213.

    Article  MATH  Google Scholar 

  8. Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J.-P., & Alexander, R. (2012). RPL: Ipv6 routing protocol for low-power and lossy networks. Technical report.

  9. Musaddiq, A., Zikria, Y. B., Kim, S. W., et al. (2020). Routing protocol for low-power and lossy networks for heterogeneous traffic network. EURASIP Journal on Wireless Communications and Networking, 2020(1), 1–23.

    Article  Google Scholar 

  10. Gaddour, O., & Koubâa, A. (2012). RPL in a nutshell: A survey. Computer Networks, 56(14), 3163–3178.

    Article  MATH  Google Scholar 

  11. Vasseur, J. P., Agarwal, N., Hui, J., Shelby, Z., Bertrand, P., & Chauvenet, C. (2011). RPL the IP routing protocol designed for low power and lossy networks. Internet Protocol for Smart Objects (IPSO) Alliance, 36, 1–20.

    Google Scholar 

  12. Lamaazi, H., & Benamar, N. (2020). A comprehensive survey on enhancements and limitations of the RPL protocol: A focus on the objective function. Ad Hoc Networks, 96, 102001.

    Article  MATH  Google Scholar 

  13. Muzammal, S. M., Murugesan, R. K., & Jhanjhi, N. (2020). A comprehensive review on secure routing in Internet of Things: Mitigation methods and trust-based approaches. IEEE Internet of Things Journal, 8(6), 4186–4210.

    Article  MATH  Google Scholar 

  14. Butun, I., Österberg, P., & Song, H. (2019). Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures. IEEE Communications Surveys & Tutorials, 22, 616–644.

    Article  MATH  Google Scholar 

  15. Bang, A. O., & Rao, U. P. (2022). EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things. Peer-to-Peer Networking and Applications, 15(1), 642–665.

    Article  MATH  Google Scholar 

  16. Verma, A., & Ranga, V. (2020). Security of RPL based 6LoWPAN networks in the internet of things: A review. IEEE Sensors Journal, 20(11), 5666–5690.

    Article  MATH  Google Scholar 

  17. Sahay, R., Geethakumari, G., & Mitra, B. (2021). A novel network partitioning attack against routing protocol in internet of things. Ad Hoc Networks, 121, 102583.

    Article  Google Scholar 

  18. Verma, A., & Ranga, V. (2020). Mitigation of DIS flooding attacks in RPL-based 6LoWPAN networks. Transactions on Emerging Telecommunications Technologies, 31(2), 3802.

    Article  MATH  Google Scholar 

  19. Pu, C., & Choo, K.-K.R. (2022). Lightweight Sybil attack detection in IoT based on bloom filter and physical unclonable function. Computers & Security, 113, 102541.

    Article  MATH  Google Scholar 

  20. Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2018). Addressing the DAO insider attack in RPL’s Internet of Things networks. IEEE Communications Letters, 23(1), 68–71.

    Article  Google Scholar 

  21. Kiran, U. (2022). Ids to detect worst parent selection attack in RPL-based IoT network. In 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), pp. 769–773. IEEE.

  22. Pu, C., & Song, T. (2018). Hatchetman attack: A denial of service attack against routing in low power and lossy networks. In 2018 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2018 4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp. 12–17. IEEE.

  23. Perazzo, P., Vallati, C., Anastasi, G., & Dini, G. (2017). DIO suppression attack against routing in the internet of things. IEEE Communications Letters, 21(11), 2524–2527.

    Article  Google Scholar 

  24. Cam-Winget, N., Hui, J., & Popa, D. (2017). Applicability statement for the routing protocol for low-power and lossy networks (RPL) in advanced metering infrastructure (AMI) networks. Technical report.

  25. Verma, A., & Ranga, V. (2020). CoSec-RPL: Detection of copycat attacks in RPL based 6LoWPANs using outlier analysis. Telecommunication Systems, 75(1), 43–61.

    Article  MATH  Google Scholar 

  26. Kaliyar, P., Jaballah, W. B., Conti, M., & Lal, C. (2020). Lidl: localization with early detection of Sybil and wormhole attacks in IoT networks. Computers & Security, 94, 101849.

    Article  Google Scholar 

  27. Challa, S., Wazid, M., Das, A. K., Kumar, N., Reddy, A. G., Yoon, E.-J., & Yoo, K.-Y. (2017). Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access, 5, 3028–3043.

    Article  Google Scholar 

  28. Park, M.-H. (2012). Challenge-response based ACK message authentication. Electronics Letters, 48(16), 1021–1023.

    Article  MATH  Google Scholar 

  29. Sharma, G., Grover, J., & Verma, A. (2023). Performance evaluation of mobile RPL-based IoT networks under version number attack. Computer Communications, 197, 12–22.

    Article  MATH  Google Scholar 

  30. Alexander, R., Brandt, A., Vasseur, J., Hui, J., Pister, K., Thubert, P., Levis, P., Struik, R., Kelsey, R., & Winter, T. (2012). RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC Editor. https://doi.org/10.17487/RFC6550. https://www.rfc-editor.org/info/rfc6550.

Download references

Funding

No funding was received for this work.

Author information

Authors and Affiliations

Authors

Contributions

Shefali Goel and Abhishek Verma wrote the main manuscript text. Abhishek Verma and Vinod Kumar Jain supervised the implementation. Shefali Goel prepared the figures, graphs. Vinod Kumar Jain proofread the manuscript and revised it critically to include technical content. All authors reviewed and did proofreading.

Corresponding author

Correspondence to Abhishek Verma.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Ethical Approval

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Goel, S., Verma, A. & Jain, V. Design and Implementation of a Lightweight Mitigation Solution for Addressing Network Partitioning Attack Against RPL Protocol. Wireless Pers Commun 139, 2027–2050 (2024). https://doi.org/10.1007/s11277-024-11704-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-024-11704-0

Keywords