{"title":"Li-MSD: A lightweight mitigation solution for DAO insider attack in RPL-based IoT","authors":"Abhishek Verma, Sachin Kumar Verma, Avinash Chandra Pandey, Jyoti Grover, Girish Sharma","doi":"arxiv-2409.10020","DOIUrl":null,"url":null,"abstract":"Many IoT applications run on a wireless infrastructure supported by\nresource-constrained nodes which is popularly known as Low-Power and Lossy\nNetworks (LLNs). Currently, LLNs play a vital role in digital transformation of\nindustries. The resource limitations of LLNs restrict the usage of traditional\nrouting protocols and therefore require an energy-efficient routing solution.\nIETF's Routing Protocol for Low-power Lossy Networks (RPL, pronounced 'ripple')\nis one of the most popular energy-efficient protocols for LLNs, specified in\nRFC 6550. In RPL, Destination Advertisement Object (DAO) control message is\ntransmitted by a child node to pass on its reachability information to its\nimmediate parent or root node. An attacker may exploit the insecure DAO sending\nmechanism of RPL to perform 'DAO insider attack' by transmitting DAO multiple\ntimes. This paper shows that an aggressive DAO insider attacker can drastically\ndegrade network performance. We propose a Lightweight Mitigation Solution for\nDAO insider attack, which is termed as 'Li-MSD'. Li-MSD uses a blacklisting\nstrategy to mitigate the attack and restore RPL performance, significantly. By\nusing simulations, it is shown that Li-MSD outperforms the existing solution in\nthe literature.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Networking and Internet Architecture","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.10020","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Many IoT applications run on a wireless infrastructure supported by
resource-constrained nodes which is popularly known as Low-Power and Lossy
Networks (LLNs). Currently, LLNs play a vital role in digital transformation of
industries. The resource limitations of LLNs restrict the usage of traditional
routing protocols and therefore require an energy-efficient routing solution.
IETF's Routing Protocol for Low-power Lossy Networks (RPL, pronounced 'ripple')
is one of the most popular energy-efficient protocols for LLNs, specified in
RFC 6550. In RPL, Destination Advertisement Object (DAO) control message is
transmitted by a child node to pass on its reachability information to its
immediate parent or root node. An attacker may exploit the insecure DAO sending
mechanism of RPL to perform 'DAO insider attack' by transmitting DAO multiple
times. This paper shows that an aggressive DAO insider attacker can drastically
degrade network performance. We propose a Lightweight Mitigation Solution for
DAO insider attack, which is termed as 'Li-MSD'. Li-MSD uses a blacklisting
strategy to mitigate the attack and restore RPL performance, significantly. By
using simulations, it is shown that Li-MSD outperforms the existing solution in
the literature.