Skip to main content
Log in

A novel blockchain based framework to secure IoT-LLNs against routing attacks

  • Regular Paper
  • Published:
Computing Aims and scope Submit manuscript

Abstract

Routing attacks in the Internet of Things environment (IoT) can result in degraded network performance and often denial of service. Low Power and Lossy Network (LLN) is that segment in IoT which comprises constrained devices like sensors and RFIDs. IPv6 Routing Protocol over Low Power and Lossy Networks (RPL) is the standard routing protocol proposed by IETF for routing in IoT-LLNs. RPL efficiently organizes and maintains the IoT-LLNs and also provides certain security features capable of countering external attacks. However, RPL is vulnerable to many insider attacks. In RPL supported IoT-LLNs, the control messages carry the LLN configuration information. The sensor nodes participating in the routing process are allowed to disseminate the configuration information to organize and maintain the LLNs. Two important configuration information carried in the control message, namely, the rank and the version number, play a major role in the topological formation of IoT-LLNs. A participating node may purposely advertise a false rank or version number information to instigate a routing attack. Such attacks degrade the performance of the IoT-LLNs and increase the consumption of network resources. In this paper, we propose a layered model of IoT routing security to analyze the vulnerabilities associated with each phase of the routing process. We explore how to leverage the inherent features of blockchain to enhance routing security in IoT-LLNs. To this end, we propose a blockchain-based framework with a smart contract for generating real-time alerts to efficiently identify the sensor nodes involved in the tampering of LLN configuration information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Winter T, Thubert P, Brandt A, Hui J, Kelsey R, Pister K, Struik R, Vasseur J. P, Alexander R (2012) RPL: IPv6 routing protocol for Low-Power and Lossy Networks. RFC 6550

  2. Kim HS, Ko J, Culler DE, Paek J (2017) Challenging the IPv6 routing protocol for low-power and lossy networks (RPL): a survey. IEEE Commun Surv Tutor 19(4):2502–25

    Article  Google Scholar 

  3. Arsalan MN, Niraj K (2016) A comprehensive study of security of Internet-of-Things. IEEE Trans Emerg Topics Comput 5(4):586–602

    Google Scholar 

  4. Kamgueu PO, Nataf E, Ndie TD (2018) Survey on RPL enhancements: a focus on topology, security and mobility. Comput Commun 120:10–12

    Article  Google Scholar 

  5. Santos L, Rabadao C, Gonçalves R (2018) Intrusion detection systems in Internet of Things: a literature review. In: IEEE 13th Iberian conference on information systems and technologies (CISTI), pp 1–7

  6. Stellios I, Kotzanikolaou P, Psarakis M, Alcaraz C, Lopez J (2018) A survey of iot-enabled cyberattacks: assessing attack paths to critical infrastructures and services. IEEE Commun Surv Tutor 20(4):3453–95

    Article  Google Scholar 

  7. Makhdoom I, Abolhasan M, Abbas H, Ni W (2019) Blockchain’s adoption in IoT: the challenges, and a way forward. J Netw Comput Appl 125(1):251–79

    Article  Google Scholar 

  8. Crosby M, Pattanayak P, Verma S, Kalyanaraman V (2016) Blockchain technology: beyond bitcoin. Appl Innov 71(2):6–10

    Google Scholar 

  9. Vasseur JP, Kim M, Pister K, Dejean N, Barthel D (2012) Routing metrics used for path calculation in low-power and lossy networks. RFC 6551

  10. Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access 4:2292–2303

    Google Scholar 

  11. Mayzaud A, Sehgal A, Badonnel R, Chrisment I, Schnwlder J (2014) A study of RPL DODAG version attacks. In: IFIP international conference on autonomous infrastructure, management and security. Springer, Berlin, pp 92–104

  12. Aris A, Oktug SF, Yalcin SB (2016) RPL version number attacks: in-depth study. In: IEEE symposium in network operations and management symposium (NOMS), pp 776–779

  13. Mayzaud A, Badonnel R, Chrisment I (2017) A distributed monitoring strategy for detecting version number attacks in RPL based networks. IEEE Trans Netw Serv Manag 14(2):472–86

    Google Scholar 

  14. Sahay R, Geethakumari G, Mitra B, Sahoo I (2018) Efficient framework for detection of version number attack in Internet of Things. In: International conference on intelligent systems design and applications. Springer, Cham, pp 480–492

  15. Dvir A, Buttyan L (2011) VeRA-version number and rank authentication in RPL. In: IEEE 8th international conference on mobile adhoc and sensor systems (MASS), pp 709–714

  16. Hummen R, Hiller J, Wirtz H, Henze M, Shafagh H, Wehrle K (2013) 6LoWPAN fragmentation attacks and mitigation mechanisms. In: Proceedings of the sixth ACM conference on security and privacy in wireless and mobile networks, pp 55–66

  17. Pinto A, Costa RF (2016) Hash-chain-based authentication for IoT. Adv Distrib Comput Artif Intell J 5(4):43–57

    Google Scholar 

  18. Khan ZA, Herrmann P (2017) A trust based distributed intrusion detection mechanism for Internet of Things. In: IEEE 31st international conference on in advanced information networking and applications (AINA), pp 1169–1176

  19. Raza S, Wallgren L, Voigt T (2013) SVELTE: real-time intrusion detection in the Internet of Things. J Ad Hoc Netw 11(8):2661–2674

    Article  Google Scholar 

  20. Sahay R, Geethakumari G, Modugu K, Mitra B (2018) Traffic convergence detection in IoT LLNs: a multilayer perceptron based mechanism. In: 2018 IEEE symposium series on computational intelligence (SSCI), pp 1715–1722

  21. Sahay R, Geethakumari G, Modugu K (2018) Attack graph—Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT. In: 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), pp 308–313

  22. Le A, Loo J, Lasebae A, Vinel A, Chen Y, Chai M (2013) The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sens J 13(10):3685–3692

    Google Scholar 

  23. Reyna A, Martín C, Chen J, Soler E, Díaz M (2018) On blockchain and its integration with IoT. Challenges and opportunities. Future Gener Comput Syst 88:173–90

    Google Scholar 

  24. Conoscenti M, Vetro A, De Martin JC (2016) Blockchain for the Internet of Things: a systematic literature review. In: 2016 IEEE/ACS 13th international conference of computer systems and applications (AICCSA), pp 1–6

  25. Alphand O, Amoretti M, Claeys T, Dall’Asta S, Duda A, Ferrari G, Rousseau F, Tourancheau B, Veltri L, Zanichelli F (2018) IoTChain: a blockchain security architecture for the Internet of Things. In: 2018 IEEE wireless communications and networking conference (WCNC), pp 1–6

  26. Teslya N, Ryabchikov I (2017) Blockchain-based platform architecture for industrial IoT. In: 21st conference of open innovations association (FRUCT), pp 321–329

  27. Ali MS, Vecchio M, Pincheira M, Dolui K, Antonelli F, Rehmani MH (2018) Applications of blockchains in the Internet of Things: a comprehensive survey. IEEE Commun Surv Tutor 21(2):1676–1717

    Google Scholar 

  28. Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for IoT security and privacy: The case study of a smart home. In: IEEE international conference on pervasive computing and communications workshops (PerCom workshops), pp 618–623

  29. Xu X, Weber I, Staples M, Zhu L, Bosch J, Bass L, Pautasso C, Rimba P (2017) A taxonomy of blockchain-based systems for architecture design. In: 2017 IEEE international conference on software architecture (ICSA), pp 243–252

  30. Geeta CM, Raghavendra S, Buyya R, Venugopal KR (2018) Data auditing and security in cloud computing: issues, challenges and future directions. Int J Comput (IJC) 28(1):8–57

    Google Scholar 

  31. Gómez-Arevalillo AD, Papadimitratos P (2017) Blockchain-based public key infrastructure for inter-domain secure routing. In: International workshop on open problems in network security (iNetSec), pp 20–38

  32. Yang Z, Yang K, Lei L, Zheng K, Leung VC (2018) Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J 6(2):1495–505

    Google Scholar 

  33. Zhang Y, Kasahara S, Shen Y, Jiang X, Wan J (2018) Smart contract-based access control for the internet of things. IEEE Internet Things J 6(2):594–605

    Google Scholar 

  34. Tan X, Huang C, Ji L (2018) Access control scheme based on combination of blockchain and XOR-coding for ICN. In: 2018 5th IEEE international conference on cyber security and cloud computing (CSCloud)/2018 4th IEEE international conference on edge computing and scalable cloud (EdgeCom), pp 160–165

  35. Cerf VG (2015) Access control and the Internet of Things. IEEE Internet Comput 19(5):96–103

    Google Scholar 

  36. Anthea M, Remi B, Isabelle C (2016) A taxonomy of attacks in RPL-based Internet of Things. Int J Netw Secur 18(3):459–473

    Google Scholar 

  37. Ramezan G, Leung C (2018) A blockchain-based contractual routing protocol for the Internet of Things using smart contracts. Wirel Commun Mob Comput 2018, 4029591

  38. Yang J, He S, Xu Y, Chen L, Ren J (2019) A trusted routing scheme using blockchain and reinforcement learning for wireless sensor networks. Sensors 19(4):970

    Google Scholar 

  39. Banerjee M, Lee J, Choo KKR (2018) A blockchain future for internet of things security: a position paper. Digit Commun Netw 4(3):149–160

    Google Scholar 

  40. Kshetri N (2017) Can blockchain strengthen the internet of things? IT Profess 19(4):68–72

    Google Scholar 

  41. Rouhani S, Deters R (2017) Performance analysis of ethereum transactions in private blockchain. In: 8th IEEE international conference on software engineering and service science, vol 24, pp 70–74

  42. Cherif IL, Kortebi A (2019) On using eXtreme Gradient Boosting (XGBoost) Machine Learning algorithm for Home Network Traffic Classification. In: IEEE 2019 Wireless Days (WD), pp 1–6

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rashmi Sahay.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sahay, R., Geethakumari, G. & Mitra, B. A novel blockchain based framework to secure IoT-LLNs against routing attacks. Computing 102, 2445–2470 (2020). https://doi.org/10.1007/s00607-020-00823-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00607-020-00823-8

Keywords

Mathematics Subject Classification

Navigation