DETONAR: Detection of Routing Attacks in RPL-Based IoT
Journal
IEEE Transactions on Network and Service Management
Journal Volume
18
Journal Issue
2
Pages
1178-1190
Date Issued
2021
Author(s)
Abstract
The Internet of Things (IoT) is a reality that changes several aspects of our daily life, from smart home monitoring to the management of critical infrastructure. The 'Routing Protocol for low power and Lossy networks' (RPL) is the only de-facto standardized routing protocol in IoT networks and is thus deployed in environmental monitoring, healthcare, smart building, and many other IoT applications. In literature, we can find several attacks aiming to affect and disrupt RPL-based networks. Therefore, it is fundamental to develop security mechanisms that detect and mitigate any potential attack in RPL-based networks. Current state-of-the-art security solutions deal with very few attacks while introducing heavy mechanisms at the expense of IoT devices and the overall network performance. In this work, we aim to develop an Intrusion Detection System (IDS) capable of dealing with multiple attacks while avoiding any RPL overhead. The proposed system is called DETONAR - DETector of rOutiNg Attacks in Rpl - and it relies on a packet sniffing approach. DETONAR uses a combination of signature and anomaly-based rules to identify any malicious behavior in the traffic (e.g., application and DIO packets). To the best of our knowledge, there are no exhaustive datasets containing RPL traffic for a vast range of attacks. To overcome this issue and evaluate our IDS, we propose RADAR - Routing Attacks DAtaset for Rpl: the dataset contains five simulations for each of the 14 considered attacks in 16 static-nodes networks. DETONAR's attack detection exceeds 80% for 10 attacks out of 14, while maintaining false positives close to zero. ? 2004-2012 IEEE.
Subjects
Internet of Things
intrusion detection system
low power and lossy networks
networking attacks
routing protocol
Automation
Intelligent buildings
Intrusion detection
Low power electronics
Network routing
Network security
Routing protocols
Attack detection
Environmental Monitoring
Internet of thing (IOT)
Intrusion Detection Systems
Malicious behavior
Security mechanism
Security solutions
State of the art
Internet of things
Type
journal article
