Abstract
Resource Attacks in the Internet of Things (IoT) target to attack resource-related things. It affects the memory, processing, energy, and battery of each node in the IoT environment. Existing protocols use complex mathematical calculations and additional control messages to detect the attacks. That consumes more energy for each node and reduces the lifetime of each node, also bringing the entire network to a halt. To overcome these problems the DE2RA-RPL protocol is proposed. It is a hybrid and lightweight protocol to detect and eliminate Destination Oriented Directed Acyclic Graph (DODAG) Advertisement Object (DAO) Flooding Attacks, Decreased Rank Attacks, and Increased Version Number Attacks at a time. The DE2RA-RPL protocol uses basic RPL control messages, a trickle timer, a minimum rank hysteresis objective function, and small byte flag values to detect and eliminate the attacks. This DE2RA-RPL protocol is suitable for smart communications systems that are used by police and military operations. The Cooja simulator, part of the Contiki operating system, simulates the proposed protocol. The simulation results are compared with existing protocols. It shows that the proposed protocol increases the Packet delivery ratio by 53.23% and Throughput by 59.74%, and decreases the Energy Consumption by 46.5% and, End-to-End Delay by 48.12% than the traditional RPL protocols.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-024-06256-w/MediaObjects/11227_2024_6256_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-024-06256-w/MediaObjects/11227_2024_6256_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-024-06256-w/MediaObjects/11227_2024_6256_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-024-06256-w/MediaObjects/11227_2024_6256_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-024-06256-w/MediaObjects/11227_2024_6256_Figa_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-024-06256-w/MediaObjects/11227_2024_6256_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-024-06256-w/MediaObjects/11227_2024_6256_Figb_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-024-06256-w/MediaObjects/11227_2024_6256_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-024-06256-w/MediaObjects/11227_2024_6256_Figc_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-024-06256-w/MediaObjects/11227_2024_6256_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-024-06256-w/MediaObjects/11227_2024_6256_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-024-06256-w/MediaObjects/11227_2024_6256_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-024-06256-w/MediaObjects/11227_2024_6256_Fig10_HTML.png)
Similar content being viewed by others
Data availability
Not Applicable.
References
Kiran U, Maurya P, Sharma H (2024) Investigating routing protocol attacks on low power and lossy IoT networks. SN Comput Sci 5(4):393
Dey D, Ghosh N (2024) iTRPL: an intelligent and trusted RPL protocol based on multi-agent reinforcement learning. ar**v preprint ar**v:2403.04416
Bokka R, Sadasivam T (2024) Simulation-based analysis of RPL routing attacks and their impact on IoT network performance. J Electron Test 2:1–5
Hkiri A, Karmani M, Bahri OB, Murayr AM, Alasmari FH, Machhout M (2024) RPL-Based IoT networks under decreased rank attack: performance analysis in static and mobile environments. Comput Mater Cont 1:78
Alfriehat N, Anbar M, Karuppayah S, Rihan SD, Alabsi BA, Momani AM (2024) Detecting version number attacks in low power and lossy networks for internet of things routing: review and taxonomy. IEEE Access 12:31136–31158
Deepavathi P, Mala C (2023) IMDRPL: identifying and eliminating malicious devices using DIO and DAO ICMP control messages in RPL-based protocol. Peer-to-Peer Netw Appl 16(5):2380–98
Sharma G, Grover J, Verma A (2023) QSec-RPL: detection of version number attacks in RPL based mobile IoT using Q-Learning. Ad Hoc Netw 1(142):103118
Bang A, Rao UP (2023) Impact analysis of rank attack on RPL-based 6LoWPAN networks in Internet of Things and aftermaths. Arab J Sci Eng 48(2):2489–505
Ankam S, Reddy NS (2023) A mechanism to detecting flooding attacks in quantum-enabled cloud-based lowpower and lossy networks. Theoret Comput Sci 4(941):29–38
Nandhini PS, Kuppuswami S, Malliga S (2023) Energy efficient thwarting rank attack from RPL based IoT networks: a review. Mater Today Proc 1(81):694–9
Rajasekar VR, Rajkumar S (2022) A study on impact of DIS flooding attack on RPL-based 6LowPAN network. Microprocess Microsyst 1(94):104675
Dhingra A, Sindhu V (2022) A review of dis-flooding attacks in RPL based IoT network. In: 2022 International Conference on Communication, Computing and Internet of Things (IC3IoT), IEEE, 10: pp 1–6
Bang AO, Rao UP (2022) EMBOF-RPL: improved RPL for early detection and isolation of rank attack in RPL-based internet of things. Peer-to-Peer Netw Appl 15(1):642–65
Osman M, He J, Mokbal FM, Zhu N (2021) Artificial neural network model for decreased rank attack detection in RPL based on IoT networks. Int J Netw Secur 23(3):496–503
Abhinaya EV, Sudhakar B (2021) A secure routing protocol for low power and lossy networks based 6LoWPAN networks to mitigate DIS flooding attacks. J Ambient Intell Humaniz Comput 3:1–2
Karmakar S, Sengupta J, Bit SD (2021) LEADER: low overhead rank attack detection for securing RPL-based IoT. In: 2021 International Conference on Communication Systems & NETworkS (COMSNETS), IEEE, pp 429–437
Seth AD, Biswas S, Dhar AK (2020) Detection and verification of decreased rank attack using round-trip times in RPL-based 6LoWPAN networks. In: 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), IEEE, 14: pp 1–6
Jhanjhi NZ, Brohi SN, Malik NA, Humayun M (2020) Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning. In: 2020 2nd International Conference on Computer and Information Sciences (ICCIS), IEEE, 13: pp 1–6
Arış A, Oktuğ SF (2020) Analysis of the RPL version number attack with multiple attackers. In: 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), IEEE, pp 1–8
Verma A, Ranga V (2020) Mitigation of DIS flooding attacks in RPL-based 6LoWPAN networks. Trans Emerg Telecommun Technol 31(2):e3802
Boudouaia MA, Ali-Pacha A, Abouaissa A, Lorenz P (2020) Security against rank attack in RPL protocol. IEEE Netw 34(4):133–9
Choukri W, Lamaazi H, Benamar N (2020) RPL rank attack detection using Deep Learning. In: 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), IEEE, pp. 1–6
Cakir S, Toklu S, Yalcin N (2020) RPL attack detection and prevention in the Internet of Things networks using a GRU based deep learning. IEEE Access 6(8):183678–89
Almusaylim Z, Jhanjhi NZ, Alhumam A (2020) Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP. Sensors 20(21):5997
Wadhaj I, Ghaleb B, Thomson C, Al-Dubai A, Buchanan WJ (2020) Mitigation mechanisms against the DAO attack on the routing protocol for low power and lossy networks (RPL). IEEE Access 2(8):43665–75
Sharma M, Elmiligi H, Gebali F, Verma A (2019) Simulating attacks for RPL and generating multi-class dataset for supervised machine learning. In: 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), IEE, pp 0020-0026
Neerugatti V, Mohan Reddy AR (2019) Machine learning based technique for detection of rank attack in RPL based internet of things networks. Int J Innov Technol Exp Eng (IJITEE) 10:2278–3075
Aydogan E, Yilmaz S, Sen S, Butun I, Forsström S, Gidlund M (2019 May 27) A central intrusion detection system for rpl-based industrial internet of things. In: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), IEEE, pp 1–5
Arış A, Yalçın SB, Oktuğ SF (2019) New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Netw 15(85):81–91
Shafique U, Khan A, Rehman A, Bashir F, Alam M (2018) Detection of rank attack in routing protocol for low power and lossy networks. Ann Telecommun 73:429–38
Mayzaud A, Badonnel R, Chrisment I (2017) A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE Trans Netw Serv Manage 14(2):472–86
Mayzaud A, Badonnel R, Chrisment I (2016) Detecting version number attacks in RPL-based networks using a distributed monitoring architecture. In: 2016 12th International Conference on Network and Service Management (CNSM), IEEE, pp 127–135
Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL-based Internet of Things. Int J Netw Secur 18(3):459–73
Aris A, Oktug SF, Yalcin SB (2016) RPL version number attacks: In-depth study. InNOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, IEEE, pp 776–779
Funding
We declare that we have not received any funding for this research work.
Author information
Authors and Affiliations
Contributions
All authors equally contributed to the works.
Corresponding author
Ethics declarations
Ethical approval and consent to participate
Not Applicable.
Human and animal ethics
This article does not contain any studies with human participants or animals.
Conflict of interest
There are no Conflict of interest to disclose.
Consent for publication
Not Applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Paganraj, D., Chelliah, M. DE2RA-RPL: detection and elimination of resource-related attacks in IoT RPL-based protocol. J Supercomput (2024). https://doi.org/10.1007/s11227-024-06256-w
Accepted:
Published:
DOI: https://doi.org/10.1007/s11227-024-06256-w