An Efficient Authentication Technique to Protect IoT Networks from Impact of RPL Attacks

An Efficient Authentication Technique to Protect IoT Networks from Impact of RPL Attacks

  IJETT-book-cover           
  
© 2021 by IJETT Journal
Volume-69 Issue-10
Year of Publication : 2021
Authors : Smita Sanjay Ambarkar, Narendra Shekokar
DOI :  10.14445/22315381/IJETT-V69I10P217

How to Cite?

Smita Sanjay Ambarkar, Narendra Shekokar, "An Efficient Authentication Technique to Protect IoT Networks from Impact of RPL Attacks," International Journal of Engineering Trends and Technology, vol. 69, no. 10, pp. 137-145, 2021. Crossref, https://doi.org/10.14445/22315381/IJETT-V69I10P217

Abstract
The Internet of Things (IoT) changes the perspective of everyday life. IoT transforms diverse applications ranging from smart homes to very critical infrastructure monitoring. The IPv6 Low Power personal area network (6LoWPAN) routes the data using the de-facto standard routing protocol for low power lossy network (RPL). The RFC 6550 of RPL protocol highlighted its insecure behavior; hence the IoT network falls prey to various attacks like version number attack, hello flood attack, increased rank, and deceased rank attack. To design an effective security solution for the mitigation of RPL attacks, a comprehensive analysis of attacks is of utmost importance. Hence this paper attempts to implement the RPL attack in the IoT network by thoroughly examining the IoT network behavior after the attacks. The paper put forth a comprehensive impact analysis of the RPL attack on the IoT network. The paper further illustrates the detailed architecture and implementation of mutual authentication. The results proved that the proposed authentication mechanism cease the entry of unauthenticated node thereby protecting the network from attacks. The proposed scheme is tested and verified with respect to power consumption and ETX metric. The results illustrate that the network not only blocks the unauthenticated node but also improves network performance.

Keywords
Authentication, IoT Networks, RPL Attacks, 6LoWPAN.

Reference
[1] Da Xu L, He W, Li S. Internet of Things in industries: a survey. IEEE Trans Ind Inform, 10(4) (2014) 2233-2243
[2] Mihovska A, Sarkar M. Smart connectivity for the Internet of Things (IoT) applications. In: New Advances in the Internet of Things. Cham, Switzerland: Springer; (2018) 105-118.
[3] IDC. The growth in connected IoT devices is expected to generate 79.4ZB of data in 2025, according to a new IDC forecast. 2019. Accessed September 21 (2019).
[4] Musaddiq A, Zikria YB, Hahm O, Yu H, Bashir AK, Kim SW. A survey on resource management in IoT operating systems. IEEE Access. 6(2018) 8459-8482.
[5] Ghaleb B, Al-Dubai AY, Ekonomou E, et al. A survey of limitations and enhancements of the IPv6 routing protocol for low-power and lossy networks: a focus on core operations. IEEE CommunSurv Tutor., 21(2) (2018) 1607-1635.
[6] Malik M, Dutta M, Granjal J. A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things. IEEE Access. 7(2019) 27443-27464.
[7] Vasseur, J., Agarwal, N., Hui, J., Shelby, Z., Bertrand, P., &Chauvenet, C. RPL: The IP routing protocol designed for low power and lossy networks. Internet Protocol for Smart Objects (IPSO) Alliance, 36(2011) .
[8] Brachman, A. (2013). RPL objective function impact on LLNs topology and performance. In Internet of things, smart spaces, and next generation networking, (2013) 340-351. Springer, Berlin, Heidelberg.
[9] Le A, Loo J, Luo Y, Lasebae A. The impacts of internal threats towards routing protocol for low power and lossy network performance. In: Proceedings of the IEEE Symposium on Computers and Communications (ISCC); (2013) Split, Croatia.
[10] Abhishek Verma and VirenderRanga “Analysis of Routing Attacks on RPL based 6LoWPAN, International Journal of Grid and Distributed Computing 11(8) (2018) 43-56 http://dx.doi.org/10.14257/ijgdc.2018.11.8.05
[11] Smita S. Ambarkar, N.M.Shekokar Critical and Comparative Analysis of DoS and Version Number Attack in Healthcare IoT System ,Proceeding of First Doctoral Symposium on Natural Computing Research, DSNCR (2020).
[12] Dvir, A.; Holczer, T.; Buttyan, L. VeRA—Version Number and Rank Authentication in RPL. In Proceedings of the 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, Valencia, Spain, (2011) 709–714.
[13] Perrey, H.; Landsmann, M.; Ugus, O.; Wählisch, M.; Schmidt, T.C. TRAIL: Topology Authentication in RPL. In EWSN ’16 Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks; Springer: Berlin/Heidelberg, Germany, (2016) 59–64
[14] Mayzaud A, Sehgal A, Badonnel R, Chrisment I, Schönwälder J. Mitigation of topological inconsistency attacks in RPL-based lowpower lossy networks. Int J NetwManag. 25(5) (2015) 320-339.
[15] Aris, A.; ÖrsYalç?n, S.B.; Oktug, S. New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Netw., 85(2019) 81–91. https://doi.org/10.1016/j.adhoc.2018.10.022.
[16] J. H. Yang and P. Y. Lin, An ID-based user authentication scheme for cloud computing, in 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, (2014) 98–101.
[17] F. Chu, R. Zhang, R. Ni, and W. Dai, An improved identity authentication scheme for internet of things in heterogeneous networking environments, in 2013 16th International Conference on Network-Based Information Systems, (2013) 589–593.
[18] S. Peng, An Id-based Multiple Authentication scheme against attacks in wireless sensor networks, in 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, 3(2012) 1042–1045.
[19] Raza S, Wallgren L, Voigt T. SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8) (2013) 2661-2674
[20] Bostani H, Sheikhan M. Hybrid of anomaly-based and specificationbased IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Computer Communications. 98 (2017) 52-71.
[21] Y. Tian, G. Chen, J. Li, A new ultralightweight RFID authentication protocol with permutation, IEEE Communications Letters, 16(5) (2012) 702-705.