Acknowledgement Based Technique for Detection of the Wormhole Attack in RPL Based Internet of Things Networks

Authors

  • Vikram Neerugatti Research scholar, Department of Computer Science and Engineering, Sri Venkateswara University, Andhra Pradesh, India
  • A. Rama Mohan Reddy Professor, Department of Computer Science and Engineering, Sri Venkateswara University, Andhra Pradesh, India

DOI:

https://doi.org/10.51983/ajcst-2019.8.S3.2075

Keywords:

IoT, RPL, 6LoWPAN, Attacks, Detection Technique, Security

Abstract

Internet of Things (IoT) is the advanced technology, were the constrained nodes/things (all the objects around us such as chair, home, car, keys, etc.) will be connected to the internet to form a network, for sharing and monitoring the data, remotely. RPL (IPv6 Routing Protocol for Low Power and Lossy networks) is a routing protocol particularly designed for the constrained (low powered, low computation, less size, etc.) networks with the protocol 6LoWPAN (IPv6 Low Powered wireless Personal Area Networks). Due to the constrained behaviour of the RPL protocol, it will leads to many RPL routing attacks such as Sinkhole, Black hole, Wormhole, Selective forwarding, rank attacks, etc. This paper was focused on the Wormhole attack. The Wormhole attack will select the packets from one location and drops those packets in some other location (malicious) by forming the Tunnelling. To detect this attack here proposed and implemented a novel approach called (ADWA). Acknowledgement based technique for detection of the wormhole attack in RPL based Internet of Things networks. This approach was shown efficient results with the Telosb sky emulator nodes in the Contiki Cooja simulator, in terms of the Packet delivery ratio, delay and detection of wormhole attack.

References

Granjal, Jorge, EdmundoMonteiro, and Jorge Sá Silva, "Security for the internet of things: a survey of existing protocols and open research issues," IEEE Communications Surveys & Tutorials, Vol. 17, No. 3, pp. 1294-1312, 2015.

Gaddour, Olfa, and AnisKoubaa, "RPL in a nutshell: A survey," Computer Networks, Vol. 56, No. 14, pp. 3163-3178, 2012.

Mosenia, Arsalan, and Niraj K. Jha, "A comprehensive study of security of internet-of-things," IEEE Transactions on Emerging Topics in Computing, Vol. 5, No. 4, pp. 586-602, 2017.

Wallgren, Linus, ShahidRaza, and Thiemo Voigt, "Routing Attacks and Countermeasures in the RPL-based Internet of Things," International Journal of Distributed Sensor Networks, Vol. 9, No. 8, pp. 794326, 2013.

Pongle, Pavan, and GurunathChavan, "A survey: Attacks on RPL and 6LoWPAN in IoT," Pervasive Computing (ICPC), 2015 International Conference on IEEE, 2015.

Raza, Shahid, Linus Wallgren, and Thiemo Voigt, "SVELTE: Real-time intrusion detection in the Internet of Things," Ad hoc networks, Vol. 11, No. 8, pp. 2661-2674, 2013.

Ahmed, Firoz, and Young BaeKo. "Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks," Security and Communication Networks, Vol. 9, No. 18, pp. 5143-5154, 2016.

Khandare, Pravin, Yogesh Sharma, and S. R. Sakhare, "Countermeasures for selective forwarding and wormhole attack in WSN," Inventive Systems and Control (ICISC), 2017 International Conference on IEEE, 2017.

Khalil, Issa, SaurabhBagchi, and Ness B. Shroff, "LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks," Dependable Systems and Networks, 2005, DSN 2005 Proceedings, International Conference on. IEEE, 2005.

Khalil, Issa, SaurabhBagchi, and Ness B. Shroff, "MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks," Ad Hoc Networks, Vol. 6, No. 3, pp. 344-362, 2008.

Hu, Y-C., Adrian Perrig, and David B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, Vol. 3, 2003.

Eriksson, Jakob, Srikanth V. Krishnamurthy, and MichalisFaloutsos, "Truelink: A practical countermeasure to the wormhole attack in wireless networks," Network Protocols 2006, ICNP’06 Proceedings of the 2006 14th IEEE International Conference on IEEE, 2006.

Song, Ning, LijunQian, and Xiangfang Li, "Wormhole attacks detection in wireless ad hoc networks: A statistical analysis approach," Parallel and distributed processing symposium 2005, Proceedings, 19th IEEE international, 2005.

Azer, Marianne, Sherif El-Kassas, and Magdy El-Soudani, "A full image of the wormhole attacks-towards introducing complex wormhole attacks in wireless ad hoc networks," arXiv preprint arXiv:0906, 1245, 2009.

Chen, Tao, et al., "A secure routing mechanism against wormhole attack in IPv6-based wireless sensor networks," Parallel Architectures, Algorithms and Programming (PAAP), 2015 Seventh International Symposium on IEEE, 2015.

Perazzo, Pericle, et al., "Implementation of a wormhole attack against arpl network: Challenges and effects," Wireless On-demand Network Systems and Services (WONS), 2018 14th Annual Conference on IEEE, 2018.

Ahsan, Muhammad Saad, Muhammad NasirMumtazBhutta, and MoazamMaqsood, "Wormhole attack detection in routing protocol for low power lossy networks," Information and Communication Technologies (ICICT), 2017 International Conference on IEEE, 2017.

Khan, FarazIdris, et al., "Wormhole attack prevention mechanism for RPL based LLN network," Ubiquitous and Future Networks (ICUFN), 2013 Fifth International Conference on IEEE, 2013.

Idris Khan, Faraz, et al., "Merkle tree based wormhole attack avoidance mechanism in low power and lossy network based networks," Security and Communication Networks, Vol. 7, No. 8, pp. 1292-1309, 2014.

Poovendran, Radha, and LoukasLazos, "A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks," Wireless Networks, Vol. 13, No. 1, pp.27-59, 2007.

Downloads

Published

22-05-2019

How to Cite

Neerugatti, V., & Rama Mohan Reddy, A. (2019). Acknowledgement Based Technique for Detection of the Wormhole Attack in RPL Based Internet of Things Networks. Asian Journal of Computer Science and Technology, 8(S3), 100–104. https://doi.org/10.51983/ajcst-2019.8.S3.2075