A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things

A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things

Anshuman Patel, Devesh Jinwala
Copyright: © 2021 |Pages: 17
DOI: 10.4018/IJISP.2021100101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Internet of things (IoT) offers communication between user-to-machine and machine-to-machine. Due to their inherent characteristics of open medium, very dynamic topology, lack of infrastructure and lack of centralized management authority, IoT present serious vulnerabilities to security attacks. The routing protocol for low-power and lossy networks (RPL) does not have an inherent mechanism to detect routing attacks. Popular among these IoT attacks is blackhole attack. An attacker can exploit the routing system of RPL to launch blackhole attack against an IoT network. To secure IoT networks from blackhole attack, trust-integrated RPL protocol (TRPL) is proposed and implemented. The trust system is embedded in the RPL protocol to detect and isolate a blackhole attack while optimizing network performance. The trust is calculated from successful interaction between two nodes. The calculated trust value is considered in parent selection. TRPL demonstrates its superior performance over the standard RPL protocol and existing techniques in the detection and isolation of blackhole attacks.
Article Preview
Top

Introduction

IoT allows user to machine and machine to machine interactions. IoT provides 3A communication where anything communicates at anytime from anywhere. In IoT, objects are sensed and controlled remotely across the network. IoT products are widely accepted by several industries like health care, energy, automotive, and agriculture (Wallgren, 2013). 75 billion IoT devices might be communicating over the network by 2025 (Statista Report, 2020). Such a large volume of devices communicating over the network poses security and privacy risk so securing a communication between IoT devices plays important role in the success of IoT. Intrusion prevention system such as authentication and encryption can be used as the first line of defense against attacks in IoT. These prevention schemes cannot eliminate internal attacks like blackhole, selective forwarding, rank, wormhole etc. If IoT nodes are captured and compromised, the attacker can obtain the cryptographic keys and propagate internal attacks. Intrusion detection and response presents a second line of defense which can detect any compromised nodes in the system. Securing routing protocol is one of the vital areas to secure IoT communication. RPL is the routing protocol for low power lossy network. RPL is vulnerable to routing attacks (Raoof et al., 2019). RPL does not have an inherent mechanism to detect the black hole attack. RPL has a build in security mechanism but it relies on encryption solution which is energy consuming. Moreover distributing and managing keys for billions of devices is complex and inefficient (Airehrour et al., 2017).

The objective of this research is to build a lightweight trusted RPL protocol, which can detect and eliminate blackhole attack from the network. A blackhole attack is when an adversary node becomes part of the victim network and then it starts to drop all the traffic that should pass through the adversary, like a blackhole. Normally in IoT network the adversary is either placed in a strategic location where a lot of the traffic has to go only through the adversary, or is combined with other attacks (e.g. sinkhole, rank attacks etc.) that would force neighboring nodes to route their traffic through the adversary. Blocking the alert signal arising from mission critical applications like military applications, disaster warning system or smart city are all scenarios with disastrous effect that seek immediate attention. Therefore, it is crucial to detect blackhole attack at the earliest to protect the IoT network. The sensors deployed in the IoT networks are energy constrained with limited storage and computing capabilities. Therefore, the focus of this research is to propose a lightweight trust integrated RPL routing protocol (TRPL) for IoT that could detect and isolate a blackhole attack while providing acceptable network performance. The contributions of this paper include:

  • 1.

    Design of trust framework.

  • 2.

    The proposed trust framework is integrated into RPL protocol, which provides a new trusted RPL protocol (TRPL).

  • 3.

    The effectiveness of TRPL is compared against the standard RPL protocol and existing techniques using simulation under blackhole attack.

The rest of the paper is organized as follows: Section 2 describes the overview of RPL protocol, Section 3 describes related work, Section 4 detailed the proposed approach, Section 5 provides security analysis and Section 6 present simulations and results.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing