skip to main content
10.1145/3055245.3055252acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Intrusion Detection in the RPL-connected 6LoWPAN Networks

Published: 02 April 2017 Publication History

Abstract

The interconnectivity of 6LoWPAN networks with the Internet raises serious security concerns, as constrained 6LoWPAN devices are accessible anywhere from the untrusted global Internet. Also, 6LoWPAN devices are mostly deployed in unattended environments, hence easy to capture and clone. Despite that state of the art crypto solutions provide information security, IPv6 enabled smart objects are vulnerable to attacks from outside and inside 6LoWPAN networks that are aimed to disrupt networks. This paper attempts to identify intrusions aimed to disrupt the Routing Protocol for Low-Power and Lossy Networks (RPL).In order to improve the security within 6LoWPAN networks, we extend SVELTE, an intrusion detection system for the Internet of Things, with an intrusion detection module that uses the ETX (Expected Transmissions) metric. In RPL, ETX is a link reliability metric and monitoring the ETX value can prevent an intruder from actively engaging 6LoWPAN nodes in malicious activities. We also propose geographic hints to identify malicious nodes that conduct attacks against ETX-based networks. We implement these extensions in the Contiki OS and evaluate them using the Cooja simulator.

References

[1]
T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik, J. Vasseur, and R. Alexander. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550, March 2012.
[2]
N. Kushalnagar, G. Montenegro, and C. Schumacher. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals. RFC 4919, August 2007.
[3]
S. Raza, S. Duquennoy, A. Chung, D. Yazar, T. Voigt, and U. Roedig. Securing communication in 6lowpan with compressed ipsec. In 7th International Conference on Distributed Computing in Sensor Systems (DCOSS'11), Barcelona, Spain, 2011.
[4]
T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, and G. Carle. DTLS based security and two-way authentication for the internet of things. Ad Hoc Networks, 2013.
[5]
S. Raza, D. Trabalza, and T. Voigt. 6lowpan compressed dtls for coap. In Distributed Computing in Sensor Systems (DCOSS), 2012 IEEE 8th International Conference on, pages 287--289. IEEE, 2012.
[6]
S. Raza, S. Duquennoy, J. Höglund, U. Roedig, and T. Voigt. Secure Communication for the Internet of Things - A Comparison of Link-Layer Security and IPsec for 6LoWPAN. Security and Communication Networks, Wiley, January 2012.
[7]
O. Garcia-Morchon, R. Hummen, S.S. Kumar, R. Struik, and S.L. Keoh. Security Considerations in the IP-based Internet of Things. March 2012.
[8]
A. Dunkels et al. The Contiki Operating System. http://www.sics.se/contiki/. Visited 2012--10-01.
[9]
N. Tsiftes, J. Eriksson, and A. Dunkels. Low-power wireless ipv6 routing with ContikiRPL. In Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, pages 406--407. ACM, 2010.
[10]
Z. Shelby, K. Kartke, C. Bormann, and B. Frank. Constrained Application Protocol (CoAP). draft-ietf-core-coap-12, October 2012.
[11]
J. Hui and P. Thubert. Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks. RFC 6282, September 2011.
[12]
C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc networks, 1(2):293--315, 2003.
[13]
S. Raza, L. Wallgren, and T. Voigt. SVELTE: Real-time Intrusion Detection in the Internet of Things. Ad Hoc Networks, Elsevier, 2013.
[14]
M. Kovatsch, S. Duquennoy, and A. Dunkels. A low-power coap for contiki. In Mobile Adhoc and Sensor Systems (MASS), 2011 IEEE 8th International Conference on, pages 855--860. IEEE, 2011.
[15]
A. Dunkels. Full tcp/ip for 8-bit architectures. In Proceedings of the 1st international conference on Mobile systems, applications and services, pages 85--98. ACM, 2003.
[16]
A. Dunkels. The ContikiMAC radio duty cycling protocol. (SICS Technical Report T2011:13), 2011.
[17]
F. Österlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt. Cross-level sensor network simulation with cooja. In Proceedings of 31st IEEE Conference on Local Computer Networks, pages 641--648. IEEE, 2006.
[18]
J. Polastre, R. Szewczyk, and D. Culler. Telos: enabling ultra-low power wireless research. In IPSN'05, April 2005.
[19]
E.C.H. Ngai, J. Liu, and M.R. Lyu. On the intruder detection for sinkhole attack in wireless sensor networks. In Communications, 2006. ICC'06. IEEE International Conference on, volume 8, pages 3383--3389. IEEE, 2006.
[20]
L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and LW Chang. Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. In Wireless Communications and Networking Conference, 2005 IEEE, volume 2, pages 1193--1199. IEEE, 2005.
[21]
J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: analysis & defenses. In Proceedings of the 3rd international symposium on Information processing in sensor networks, pages 259--268. ACM, 2004.
[22]
S. Kent. Ip encapsulating security payload (esp). RFC 4303, 2005.
[23]
A. Conta, S. Deering, and M. Gupta. Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification. RFC 4443 (Draft Standard), March 2006. Updated by RFC 4884.

Cited By

View all
  • (2024)Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game TheorySensors10.3390/s2413415224:13(4152)Online publication date: 26-Jun-2024
  • (2024)FOG-RPL: Fog Computing-based Routing Protocol for IoT NetworksRecent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering)10.2174/235209651666623051012523817:2(170-180)Online publication date: Feb-2024
  • (2024)Enhancing Security in LLNs Using a Hybrid Trust-Based Intrusion Detection System for RPLIEEE Access10.1109/ACCESS.2024.339191812(58836-58850)Online publication date: 2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IoTPTS '17: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security
April 2017
46 pages
ISBN:9781450349697
DOI:10.1145/3055245
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 April 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. 6lowpan
  2. ETX
  3. IDS
  4. IPv6
  5. RPL
  6. cyber security
  7. internet of things
  8. intrusion detection

Qualifiers

  • Research-article

Funding Sources

Conference

ASIA CCS '17
Sponsor:

Acceptance Rates

IoTPTS '17 Paper Acceptance Rate 5 of 14 submissions, 36%;
Overall Acceptance Rate 16 of 39 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)21
  • Downloads (Last 6 weeks)1
Reflects downloads up to 14 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game TheorySensors10.3390/s2413415224:13(4152)Online publication date: 26-Jun-2024
  • (2024)FOG-RPL: Fog Computing-based Routing Protocol for IoT NetworksRecent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering)10.2174/235209651666623051012523817:2(170-180)Online publication date: Feb-2024
  • (2024)Enhancing Security in LLNs Using a Hybrid Trust-Based Intrusion Detection System for RPLIEEE Access10.1109/ACCESS.2024.339191812(58836-58850)Online publication date: 2024
  • (2024)A Survey on 6LoWPAN Security for IoT: Taxonomy, Architecture, and Future DirectionsWireless Personal Communications10.1007/s11277-024-11382-y137:1(153-197)Online publication date: 6-Jul-2024
  • (2024)A Lightweight Cooperative Intrusion Detection System for RPL-based IoTWireless Personal Communications10.1007/s11277-024-11009-2134:4(2235-2258)Online publication date: 13-Apr-2024
  • (2023)Comparative Study of Routing Protocols for IoT NetworksRecent Patents on Engineering10.2174/187221211766623012014235817:6Online publication date: Nov-2023
  • (2023)A Comprehensive Survey on Machine Learning-Based Intrusion Detection Systems for Secure Communication in Internet of ThingsComputational Intelligence and Neuroscience10.1155/2023/89819882023(1-24)Online publication date: 27-Jan-2023
  • (2023)The Era of Internet of Things: Towards better security using machine learning2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)10.1109/ITIKD56332.2023.10099608(1-5)Online publication date: 8-Mar-2023
  • (2023)Security Challenges of Selective Forwarding Attack and Design a Secure ECDH-Based Authentication Protocol to Improve RPL SecurityIEEE Access10.1109/ACCESS.2022.322143411(11268-11280)Online publication date: 2023
  • (2023)Energy efficient thwarting rank attack from RPL based IoT networks: A reviewMaterials Today: Proceedings10.1016/j.matpr.2021.04.16781(694-699)Online publication date: 2023
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media