IDEAS home Printed from https://ideas.repec.org/a/spr/telsys/v75y2020i1d10.1007_s11235-020-00674-w.html
   My bibliography  Save this article

CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis

Author

Listed:
  • Abhishek Verma

    (National Institute of Technology Kurukshetra)

  • Virender Ranga

    (National Institute of Technology Kurukshetra)

Abstract

The IPv6 routing protocol for low-power and lossy networks (RPL) is the standard routing protocol for IPv6 based low-power wireless personal area networks (6LoWPANs). In RPL protocol, DODAG information object (DIO) messages are used to disseminate routing information to other nodes in the network. A malicious node may eavesdrop DIO messages of its neighbor nodes and later replay the captured DIO many times with fixed intervals. In this paper, we present and investigate one of the severe attacks named as a non-spoofed copycat attack, a type of replay based DoS attack against RPL protocol. It is shown that the non-spoofed copycat attack increases the average end-to-end delay (AE2ED) and packet delivery ratio of the network. Thus, to address this problem, an intrusion detection system (IDS) named CoSec-RPL is proposed in this paper. The attack detection logic of CoSec-RPL is primarily based on the idea of outlier detection (OD). CoSec-RPL significantly mitigates the effects of the non-spoofed copycat attack on the network’s performance. The effectiveness of the proposed IDS is compared with the standard RPL protocol. The experimental results indicate that CoSec-RPL detects and mitigates non-spoofed copycat attack efficiently in both static and mobile network scenarios without adding any significant overhead to the nodes. To the best of our knowledge, CoSec-RPL is the first RPL specific IDS that utilizes OD for intrusion detection in 6LoWPANs.

Suggested Citation

  • Abhishek Verma & Virender Ranga, 2020. "CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 75(1), pages 43-61, September.
  • Handle: RePEc:spr:telsys:v:75:y:2020:i:1:d:10.1007_s11235-020-00674-w
    DOI: 10.1007/s11235-020-00674-w
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s11235-020-00674-w
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s11235-020-00674-w?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Vipindev Adat & B. B. Gupta, 2018. "Security in Internet of Things: issues, challenges, taxonomy, and architecture," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 67(3), pages 423-441, March.
    2. Anthéa Mayzaud & Anuj Sehgal & Rémi Badonnel & Isabelle Chrisment & Jürgen Schönwälder, 2015. "Mitigation of topological inconsistency attacks in RPL‐based low‐power lossy networks," International Journal of Network Management, John Wiley & Sons, vol. 25(5), pages 320-339, September.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Jianmao Xiao & Xinyi Liu & Jia Zeng & Yuanlong Cao & Zhiyong Feng, 2022. "Recommendation of Healthcare Services Based on an Embedded User Profile Model," International Journal on Semantic Web and Information Systems (IJSWIS), IGI Global, vol. 18(1), pages 1-21, January.
    2. Silviu-Gabriel Szentesi & Lavinia Denisia Cuc & Ramona Lile & Paul Nichita Cuc, 2021. "Internet of Things (IoT), Challenges and Perspectives in Romania: A Qualitative Research," The AMFITEATRU ECONOMIC journal, Academy of Economic Studies - Bucharest, Romania, vol. 23(57), pages 448-448.
    3. Kumar Prateek & Nitish Kumar Ojha & Fahiem Altaf & Soumyadev Maity, 2023. "Quantum secured 6G technology-based applications in Internet of Everything," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 82(2), pages 315-344, February.
    4. Nadir, Ibrahim & Mahmood, Haroon & Asadullah, Ghalib, 2022. "A taxonomy of IoT firmware security and principal firmware analysis techniques," International Journal of Critical Infrastructure Protection, Elsevier, vol. 38(C).
    5. Isha Batra & Sahil Verma & Arun Malik & Kavita & Uttam Ghosh & Joel J. P. C. Rodrigues & Gia Nhu Nguyen & A. S. M. Sanwar Hosen & Vinayagam Mariappan, 2020. "Hybrid Logical Security Framework for Privacy Preservation in the Green Internet of Things," Sustainability, MDPI, vol. 12(14), pages 1-16, July.
    6. Jun-Feng Tian & Hao-Ning Wang, 2020. "An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios," International Journal of Distributed Sensor Networks, , vol. 16(5), pages 15501477209, May.
    7. Eric Forcael & Isabella Ferrari & Alexander Opazo-Vega & Jesús Alberto Pulido-Arcas, 2020. "Construction 4.0: A Literature Review," Sustainability, MDPI, vol. 12(22), pages 1-28, November.
    8. Celso Carvalho & Edjair Mota & Eric Ferraz & Paulo Seixas & Paulo Souza & Vitor Tavares & Walfredo Lucena Filho & David Ferreira & Pietro Manzoni & Carlos Calafate, 2019. "Entropy based routing for mobile, low power and lossy wireless sensors networks," International Journal of Distributed Sensor Networks, , vol. 15(7), pages 15501477198, July.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:telsys:v:75:y:2020:i:1:d:10.1007_s11235-020-00674-w. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.