{"title":"Simulation-based Analysis of RPL Routing Attacks and Their Impact on IoT Network Performance","authors":"","doi":"10.1007/s10836-024-06106-w","DOIUrl":null,"url":null,"abstract":"<h3>Abstract</h3> <p>The recent expansion of the Internet of Things (IoT) owes a lot to the significant contribution of the 6LoWPAN protocol, which has been extensively employed in low-power and lossy networks. To facilitate communication in 6LoWPAN networks, the Internet Engineering Task Force (IETF) has suggested the usage of the Routing Protocol for Low-Power and Lossy Networks (RPL). Despite its usefulness, the open and restricted nature of the RPL protocol renders it susceptible to both internal and external attacks. Since IoT devices connected through the RPL protocol have limited resources like processing power, battery life, memory, and bandwidth, ensuring their security is of the utmost importance. One of the primary obstacles to IoT networks is RPL routing attacks, which disrupt the network's normal routing activities and structure. This study investigates the impact of five RPL routing attacks, namely Blackhole, Sybil, Selective Forwarding (SF), Sinkhole, DIO suppression, and DIS flooding, on the IoT networks’ performance. The study evaluated the network's performance for normal and five routing attack scenarios using numerous performance metrics including Link throughput, No. of packets generated (control and data), Sensor data throughput, Packet Delivery Ratio (PDR), and Delay in packet delivery. This work conducted simulations using the Tetcos NetSim v12.1 IoT network simulator tool and is the first to analyze IoT network performance under multiple routing assault scenarios with various performance measures. The analysis showed that the performance metrics of PDR, Sensor data throughput, and No. of data packets transmitted decreased significantly in attack scenarios compared to the normal scenario, with an average decreased percentage of 70%, 70%, and 39.4%, respectively. In contrast, the metrics Link throughput, Delay, and No. of control packets transmitted increased in attack scenarios compared to the normal scenario, with average values supplemented by a factor of 35, 255, and 36, respectively. Additionally, the Destination-Oriented Directed Acyclic Graph (DODAG) real-time formation under different scenarios was provided.</p>","PeriodicalId":501485,"journal":{"name":"Journal of Electronic Testing","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Electronic Testing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/s10836-024-06106-w","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The recent expansion of the Internet of Things (IoT) owes a lot to the significant contribution of the 6LoWPAN protocol, which has been extensively employed in low-power and lossy networks. To facilitate communication in 6LoWPAN networks, the Internet Engineering Task Force (IETF) has suggested the usage of the Routing Protocol for Low-Power and Lossy Networks (RPL). Despite its usefulness, the open and restricted nature of the RPL protocol renders it susceptible to both internal and external attacks. Since IoT devices connected through the RPL protocol have limited resources like processing power, battery life, memory, and bandwidth, ensuring their security is of the utmost importance. One of the primary obstacles to IoT networks is RPL routing attacks, which disrupt the network's normal routing activities and structure. This study investigates the impact of five RPL routing attacks, namely Blackhole, Sybil, Selective Forwarding (SF), Sinkhole, DIO suppression, and DIS flooding, on the IoT networks’ performance. The study evaluated the network's performance for normal and five routing attack scenarios using numerous performance metrics including Link throughput, No. of packets generated (control and data), Sensor data throughput, Packet Delivery Ratio (PDR), and Delay in packet delivery. This work conducted simulations using the Tetcos NetSim v12.1 IoT network simulator tool and is the first to analyze IoT network performance under multiple routing assault scenarios with various performance measures. The analysis showed that the performance metrics of PDR, Sensor data throughput, and No. of data packets transmitted decreased significantly in attack scenarios compared to the normal scenario, with an average decreased percentage of 70%, 70%, and 39.4%, respectively. In contrast, the metrics Link throughput, Delay, and No. of control packets transmitted increased in attack scenarios compared to the normal scenario, with average values supplemented by a factor of 35, 255, and 36, respectively. Additionally, the Destination-Oriented Directed Acyclic Graph (DODAG) real-time formation under different scenarios was provided.