Log in

DE2RA-RPL: detection and elimination of resource-related attacks in IoT RPL-based protocol

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Resource Attacks in the Internet of Things (IoT) target to attack resource-related things. It affects the memory, processing, energy, and battery of each node in the IoT environment. Existing protocols use complex mathematical calculations and additional control messages to detect the attacks. That consumes more energy for each node and reduces the lifetime of each node, also bringing the entire network to a halt. To overcome these problems the DE2RA-RPL protocol is proposed. It is a hybrid and lightweight protocol to detect and eliminate Destination Oriented Directed Acyclic Graph (DODAG) Advertisement Object (DAO) Flooding Attacks, Decreased Rank Attacks, and Increased Version Number Attacks at a time. The DE2RA-RPL protocol uses basic RPL control messages, a trickle timer, a minimum rank hysteresis objective function, and small byte flag values to detect and eliminate the attacks. This DE2RA-RPL protocol is suitable for smart communications systems that are used by police and military operations. The Cooja simulator, part of the Contiki operating system, simulates the proposed protocol. The simulation results are compared with existing protocols. It shows that the proposed protocol increases the Packet delivery ratio by 53.23% and Throughput by 59.74%, and decreases the Energy Consumption by 46.5% and, End-to-End Delay by 48.12% than the traditional RPL protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Algorithm 1
Fig. 5
Algorithm 2
Fig. 6
Algorithm 3
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

Not Applicable.

References

  1. Kiran U, Maurya P, Sharma H (2024) Investigating routing protocol attacks on low power and lossy IoT networks. SN Comput Sci 5(4):393

    Article  Google Scholar 

  2. Dey D, Ghosh N (2024) iTRPL: an intelligent and trusted RPL protocol based on multi-agent reinforcement learning. ar**v preprint ar**v:2403.04416

  3. Bokka R, Sadasivam T (2024) Simulation-based analysis of RPL routing attacks and their impact on IoT network performance. J Electron Test 2:1–5

    Google Scholar 

  4. Hkiri A, Karmani M, Bahri OB, Murayr AM, Alasmari FH, Machhout M (2024) RPL-Based IoT networks under decreased rank attack: performance analysis in static and mobile environments. Comput Mater Cont 1:78

    Google Scholar 

  5. Alfriehat N, Anbar M, Karuppayah S, Rihan SD, Alabsi BA, Momani AM (2024) Detecting version number attacks in low power and lossy networks for internet of things routing: review and taxonomy. IEEE Access 12:31136–31158

    Article  Google Scholar 

  6. Deepavathi P, Mala C (2023) IMDRPL: identifying and eliminating malicious devices using DIO and DAO ICMP control messages in RPL-based protocol. Peer-to-Peer Netw Appl 16(5):2380–98

    Article  Google Scholar 

  7. Sharma G, Grover J, Verma A (2023) QSec-RPL: detection of version number attacks in RPL based mobile IoT using Q-Learning. Ad Hoc Netw 1(142):103118

    Article  Google Scholar 

  8. Bang A, Rao UP (2023) Impact analysis of rank attack on RPL-based 6LoWPAN networks in Internet of Things and aftermaths. Arab J Sci Eng 48(2):2489–505

    Article  Google Scholar 

  9. Ankam S, Reddy NS (2023) A mechanism to detecting flooding attacks in quantum-enabled cloud-based lowpower and lossy networks. Theoret Comput Sci 4(941):29–38

    Article  MathSciNet  Google Scholar 

  10. Nandhini PS, Kuppuswami S, Malliga S (2023) Energy efficient thwarting rank attack from RPL based IoT networks: a review. Mater Today Proc 1(81):694–9

    Article  Google Scholar 

  11. Rajasekar VR, Rajkumar S (2022) A study on impact of DIS flooding attack on RPL-based 6LowPAN network. Microprocess Microsyst 1(94):104675

    Article  Google Scholar 

  12. Dhingra A, Sindhu V (2022) A review of dis-flooding attacks in RPL based IoT network. In: 2022 International Conference on Communication, Computing and Internet of Things (IC3IoT), IEEE, 10: pp 1–6

  13. Bang AO, Rao UP (2022) EMBOF-RPL: improved RPL for early detection and isolation of rank attack in RPL-based internet of things. Peer-to-Peer Netw Appl 15(1):642–65

    Article  Google Scholar 

  14. Osman M, He J, Mokbal FM, Zhu N (2021) Artificial neural network model for decreased rank attack detection in RPL based on IoT networks. Int J Netw Secur 23(3):496–503

    Google Scholar 

  15. Abhinaya EV, Sudhakar B (2021) A secure routing protocol for low power and lossy networks based 6LoWPAN networks to mitigate DIS flooding attacks. J Ambient Intell Humaniz Comput 3:1–2

    Google Scholar 

  16. Karmakar S, Sengupta J, Bit SD (2021) LEADER: low overhead rank attack detection for securing RPL-based IoT. In: 2021 International Conference on Communication Systems & NETworkS (COMSNETS), IEEE, pp 429–437

  17. Seth AD, Biswas S, Dhar AK (2020) Detection and verification of decreased rank attack using round-trip times in RPL-based 6LoWPAN networks. In: 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), IEEE, 14: pp 1–6

  18. Jhanjhi NZ, Brohi SN, Malik NA, Humayun M (2020) Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning. In: 2020 2nd International Conference on Computer and Information Sciences (ICCIS), IEEE, 13: pp 1–6

  19. Arış A, Oktuğ SF (2020) Analysis of the RPL version number attack with multiple attackers. In: 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), IEEE, pp 1–8

  20. Verma A, Ranga V (2020) Mitigation of DIS flooding attacks in RPL-based 6LoWPAN networks. Trans Emerg Telecommun Technol 31(2):e3802

    Article  Google Scholar 

  21. Boudouaia MA, Ali-Pacha A, Abouaissa A, Lorenz P (2020) Security against rank attack in RPL protocol. IEEE Netw 34(4):133–9

    Article  Google Scholar 

  22. Choukri W, Lamaazi H, Benamar N (2020) RPL rank attack detection using Deep Learning. In: 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), IEEE, pp. 1–6

  23. Cakir S, Toklu S, Yalcin N (2020) RPL attack detection and prevention in the Internet of Things networks using a GRU based deep learning. IEEE Access 6(8):183678–89

    Article  Google Scholar 

  24. Almusaylim Z, Jhanjhi NZ, Alhumam A (2020) Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP. Sensors 20(21):5997

    Article  Google Scholar 

  25. Wadhaj I, Ghaleb B, Thomson C, Al-Dubai A, Buchanan WJ (2020) Mitigation mechanisms against the DAO attack on the routing protocol for low power and lossy networks (RPL). IEEE Access 2(8):43665–75

    Article  Google Scholar 

  26. Sharma M, Elmiligi H, Gebali F, Verma A (2019) Simulating attacks for RPL and generating multi-class dataset for supervised machine learning. In: 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), IEE, pp 0020-0026

  27. Neerugatti V, Mohan Reddy AR (2019) Machine learning based technique for detection of rank attack in RPL based internet of things networks. Int J Innov Technol Exp Eng (IJITEE) 10:2278–3075

    Google Scholar 

  28. Aydogan E, Yilmaz S, Sen S, Butun I, Forsström S, Gidlund M (2019 May 27) A central intrusion detection system for rpl-based industrial internet of things. In: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), IEEE, pp 1–5

  29. Arış A, Yalçın SB, Oktuğ SF (2019) New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Netw 15(85):81–91

    Article  Google Scholar 

  30. Shafique U, Khan A, Rehman A, Bashir F, Alam M (2018) Detection of rank attack in routing protocol for low power and lossy networks. Ann Telecommun 73:429–38

    Article  Google Scholar 

  31. Mayzaud A, Badonnel R, Chrisment I (2017) A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE Trans Netw Serv Manage 14(2):472–86

    Article  Google Scholar 

  32. Mayzaud A, Badonnel R, Chrisment I (2016) Detecting version number attacks in RPL-based networks using a distributed monitoring architecture. In: 2016 12th International Conference on Network and Service Management (CNSM), IEEE, pp 127–135

  33. Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL-based Internet of Things. Int J Netw Secur 18(3):459–73

    Google Scholar 

  34. Aris A, Oktug SF, Yalcin SB (2016) RPL version number attacks: In-depth study. InNOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, IEEE, pp 776–779

Download references

Funding

We declare that we have not received any funding for this research work.

Author information

Authors and Affiliations

Authors

Contributions

All authors equally contributed to the works.

Corresponding author

Correspondence to Deepavathi Paganraj.

Ethics declarations

Ethical approval and consent to participate

Not Applicable.

Human and animal ethics

This article does not contain any studies with human participants or animals.

Conflict of interest

There are no Conflict of interest to disclose.

Consent for publication

Not Applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Paganraj, D., Chelliah, M. DE2RA-RPL: detection and elimination of resource-related attacks in IoT RPL-based protocol. J Supercomput (2024). https://doi.org/10.1007/s11227-024-06256-w

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11227-024-06256-w

Keywords

Navigation