Security explorations for routing attacks in low power networks on internet of things

  • PDF / 1,899,442 Bytes
  • 35 Pages / 439.37 x 666.142 pts Page_size
  • 47 Downloads / 173 Views

DOWNLOAD

REPORT


Security explorations for routing attacks in low power networks on internet of things Saurabh Sharma1 · Vinod Kumar Verma1  Accepted: 18 October 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract The routing protocol for low power and lossy networks works as an effective method for communication in Contiki. However, many security attacks exist in RPL. These attacks affect the traffic or energy of the network. This paper focused on the persistent explorations of Contiki-based IoT networks to examine the effect of three wellknown security attacks that exist on RPL. The RPL security attacks are named as: hello flood attack, decreased rank attack and increased version attack. The impact of these security attacks has been evaluated for scalability, energy efficiency and destination-oriented directed acyclic graph construction over simulated IoT networks in Contiki. All three aforesaid attacks are found to be responsible for affecting the DODAG construction, rising the network traffic and power consumption in one way or the other. To investigate the impact of attacks particularly on the scalability, the simulations are accomplished using eight different scenarios. It is found that the throughput of the network increases with the rise in the number of normal nodes (N) up to a critical point, at which N has optimum value. It is found that at N = 40, the critical point appears for many categories in different attacks. Like, “resdm” and “resem” categories possess this critical point through hello flood attack. Similarly, the “rdsdm” category has maximum throughput at N = 40 through increased version attack. Likewise, the decreased rank attack brought this critical point at N = 40 for categories “rdsem” and “resem”. The simulation results show that regardless of the attacks “rese” and “rdse” categories produce more throughput than “resd” and “rdsd” categories. This work also demonstrates the effect of the size of heterogenous packets on multiple throughput metrics. Keywords  Internet of things · Energy efficiency · Scalability · Security · Sensor networks

* Vinod Kumar Verma [email protected] 1



Sant Longowal Institute of Engineering and Technology, Longowal ‑148106, Sangrur, Punjab, India

13

Vol.:(0123456789)



S. Sharma, V. K. Verma

1 Introduction There are significant rises in the applications of IoT in the society which is acceptable worldwide. The mainstream researchers are worked persistently for the growth of this extensive domain. IoT networks have their applications in health care, traffic monitoring and controlling, smart cities, smart homes, military target tracking, and surveillance, smart logistics, environmental monitoring, smart energy and smart grid, etc. IoT is feasibly termed as a network of identifiable devices through the internet in sensing and monitoring processes [1]. IoT refers to ‘‘a world-wide network of interconnected objects uniquely addressable, based on standard communication protocols, whose point of convergence is internet’’ [2]. IoT is the notion tha