A novel blockchain based framework to secure IoT-LLNs against routing attacks

  • PDF / 1,468,103 Bytes
  • 26 Pages / 439.37 x 666.142 pts Page_size
  • 62 Downloads / 182 Views

DOWNLOAD

REPORT


A novel blockchain based framework to secure IoT-LLNs against routing attacks Rashmi Sahay1

· G. Geethakumari1 · Barsha Mitra1

Received: 13 January 2020 / Accepted: 13 May 2020 © Springer-Verlag GmbH Austria, part of Springer Nature 2020

Abstract Routing attacks in the Internet of Things environment (IoT) can result in degraded network performance and often denial of service. Low Power and Lossy Network (LLN) is that segment in IoT which comprises constrained devices like sensors and RFIDs. IPv6 Routing Protocol over Low Power and Lossy Networks (RPL) is the standard routing protocol proposed by IETF for routing in IoT-LLNs. RPL efficiently organizes and maintains the IoT-LLNs and also provides certain security features capable of countering external attacks. However, RPL is vulnerable to many insider attacks. In RPL supported IoT-LLNs, the control messages carry the LLN configuration information. The sensor nodes participating in the routing process are allowed to disseminate the configuration information to organize and maintain the LLNs. Two important configuration information carried in the control message, namely, the rank and the version number, play a major role in the topological formation of IoT-LLNs. A participating node may purposely advertise a false rank or version number information to instigate a routing attack. Such attacks degrade the performance of the IoT-LLNs and increase the consumption of network resources. In this paper, we propose a layered model of IoT routing security to analyze the vulnerabilities associated with each phase of the routing process. We explore how to leverage the inherent features of blockchain to enhance routing security in IoT-LLNs. To this end, we propose a blockchain-based framework with a smart contract for generating real-time alerts to efficiently identify the sensor nodes involved in the tampering of LLN configuration information. Keywords IoT · RPL · Routing security · Blockchain · Smart contracts Mathematics Subject Classification 6802

B

Rashmi Sahay [email protected] G. Geethakumari [email protected]

1

Department of CSIS, BITS Pilani, Hyderabad Campus, Hyderabad, India

123

R. Sahay et al.

1 Introduction The vision of the Internet of Things (IoT) to connect all physical devices to the Internet has led to its proliferation in several application domains like smart cities, smart grids, healthcare and connected vehicle technology. Such applications entail the deployment of large scale networks comprising sensors and RFIDs. Such networks are known as Low Power and Lossy Networks (LLNs). Due to the constrained characteristics of the sensors and the RFIDs and the large scale of LLNs, routing in such networks necessitates the fulfillment of requirements like scalability, dynamicity, parametric constraints, directed information flow and support for multicast and anycast message dissemination. Internet Engineering Task Force (IETF) has specified the IPv6 Routing Protocol over Low Power and Lossy Networks (RPL) to support the r