RM
RM
Table of Contents
Certificate i
Abstract ii
Acknowledgements iv
Table of Contents v
1 Introduction 1
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Challenges in the Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2.1 Device challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2.2 Network challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2.3 Architectural challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2.4 Security as a Challenge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2.5 Gaps in Existing Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.3 Objectives of the Dissertation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.4 Problem Definition and Scope of Work . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.5 Major Contributions of the Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.6 Thesis Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Bibliography 147
Biography 160
ix
List of Tables
6.1 A comparison of Various Topological Attacks with the Proposed Network Partitioning
Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
6.2 Observations Made During Network Partitioning Attack Detection . . . . . . . . . . . 121
7.1 Performance Comparison of the Proposed Mitigation Strategy under Attack with RPL
under Normal Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
7.2 Task Specified by Variable cust msg Values . . . . . . . . . . . . . . . . . . . . . . . . 137
x
List of Figures
List of Abbreviations
ATG - Average Time Gap
BCN - Blockchain Network
CNN - Convolution Neural Network
DAG - Directed Acyclic Graph
DAO - DODAG Advertisement Object
DDoS - Distributed Denial of Service
DIO - DODAG Information Object
DIS - DODAG Information Solicitation
DoS - Denial of Service
DODAG - Destination Oriented Directed Acyclic Graph
DRA - Decreased Rank Attack
EED - End to End Delay
ERPL - Enhanced RPL
ETX - Expected Transmission Count
FNN - Feedforward Neural Network
GCN - Graph Convolution Network
HPC - High Performance Computing
IDS - Intrusion Detection System
IETF - Internet Engineering Task Force
IID - Independently and Identically Distributed
IoT - Internet of Things
IRA - Increased Rank Attack
LLN - Low Power and Lossy Network
6LBR - 6LoWPAN Border Router
6LoWPAN - IPv6 over Low Power Wireless Personal Area Network
LSTM - Long Short Term Memory
MOP - Mode of Operation
NPA - Network Partitioning Attack
NCT - Network Convergence Time
NETSTACK - Network Stack
PCAP - Packet Capture
PKI - Public Key Infrastructure
RPL - IPv6 Routing Protocol over Low Power and Lossy Network
ROLL - Routing over Low Power and Lossy Networks
RNN - Recurrent Neural Network
xiii
Chapter 1
Introduction
“The recent security attacks on the Internet of Things (IoT) environment have raised
concerns over the underlying routing protocols. Securing the IoT environment against
routing attacks is an important security requirement. The solution to this problem lies
in the efficient routing attack vulnerability analysis, devising mechanisms for the
early detection of these attacks, and robust mitigation schemes.”
1.1 Introduction
Kevin Ashton first coined the term Internet of Things in his presentation on automating the supply
chain processes using RFIDs. His idea of the Internet of Things (IoT) was to empower computing
devices and make the human intervention redundant. The two critical behavioral characteristics
achieved by the Internet of Things are interaction with the physical world and the possibility of
communication and analysis of the collected data to drive business processes. The term “Things”
refers to smart objects equipped with one or more sensors or actuators, a limited capacity micropro-
cessor, a communication device, and a power source. The sensor in the smart object is what gives
it the ability to interact with the physical world. The microprocessor enables the transformation of
the captured data from the sensors at a limited speed and complexity. The communication device
enables the smart object to communicate the sensor reading to the outside world and take input from
other smart objects. As smart objects can be placed in remote locations, constant energy supply is
not always possible, so they require battery power sources for functioning. In the last decade, the
Internet of Things has been interpreted in diverse ways and used in multiple applications ranging
from home automation, building automation, industrial IoT to the smart city.
The Internet of Things is developed based on similar technologies like the machine to machine
communication, telemetry, and Wireless Sensor Networks (WSNs). IoT draws its closest similarity
to WSNs because both these environments focus on data gathering and communication through wire-
less radios. The difference lies in the frequency and scale of data gathering and communication and
the fact that the IoT devices perform other tasks like actuating and control. Further, the constant
Internet connectivity of the IoT devices helps in the retention of the data gathered at the data cen-
ters, which provides an option for intelligent data analysis using Artificial Intelligence and Machine
2
Learning.
Though IoT has numerous benefits and applications, the constrained nature of embedded de-
vices in the IoT environment creates many challenges. The presence of heterogeneous devices, the
enormous volume of data generated, multiple layers of application interfaces, etc. leads to various
infrastructural and security challenges. In particular, security is a major concern in the IoT envi-
ronment. Managing identities of a larger volume of IoT devices, identifying compromised devices,
designing lightweight security solutions for various layers of the IoT infrastructure, and incorporating
security solutions in the constrained environment is challenging. In this dissertation, we focus on
securing the IoT environment from the threats stemming from the vulnerabilities of the underlying
routing protocol. The rest of the chapter is organized as follows. In Section 1.2, we present various
challenges posed by IoT environment and discuss the gap in the existing research. In Section 1.3,
we present the objective of the dissertation and discuss the problem definition in Section 1.4. In
Section 1.5, we present the major contributions of the dissertation and in Section 1.6, we present the
organization of the thesis.
• Power Consumption: The battery-powered embedded devices should have low duty cycles,
whereas the Internet Protocol requires continuously active devices. While wireless embedded
radio technologies, such as IEEE 802.15.4, do not inherently support multicasting, broadcast-
ing or flooding increases the wastage of battery power.
• Bandwidth and Frame size: Wireless embedded devices have a bandwidth of the order
of 20–250 kbit/s and a frame size of 40–200 bytes. The minimum frame size for standard
IPv6 is 1280 bytes, whereas the IEEE 802.15.4 standard defines a frame size of 127 bytes.
Further, mesh topology is more suitable for wireless embedded devices in achieving the required
efficiency and coverage. In a mesh topology, the bandwidth also suffers as the channel is shared
by multihop forwarding nodes, thus requiring fragmentation.
3
• Physical Size and Cost: The size of the embedded device governs the potential application.
For example, wearable devices, smart appliances devices, smart home devices, etc. need to
be small. Since most IoT applications are large scale, minimizing cost also becomes essential.
The requirement of small-sized and low-cost hardware can put constraints on software design
that can run on a resource-constrained environment and be power-efficient.
• Scale: The large scale of data generated by the considerably constrained nodes have implica-
tions on the network performance in terms of the volume and speed at which the network can
carry and transport the data packets without loss. This imposes several design constraints on
the underlying routing protocol. Further, the routing protocol must be aware of the illusive
property of lossyness as packet loss may result from the lossy characteristics of the embedded
devices or external environmental factors like temperature and humidity.
• Flood of data from billions of actors: Data will be gathered, transported and stored
in massive quantity. The challenge will be to provide the required bandwidth, giving data
identification and providing the appropriate storage media [1],[2],[4].
• Construction of the core IoT network: The core network consists of sensors and actuators
which gather data and trigger events. These low power devices have limited computational
capabilities on which traditional algorithms though robust and secure, cannot run. The chal-
lenge is to tap the full potential of the underlying hardware and yet to keep the operations
lightweight [1].
• Construction of the access network: The core network of sensors and RFIDs is not IP
configurable, and efficient means have to be devised to make the sensors accessible from a
remote location.
To make the core IoT network accessible to IP devices, the IETF proposed IPv6 over Low power and
Lossy Network (6LoWPAN) [5]. It is the adaptation layer between the link layer and the network
layer of the devices. It is a network protocol for the Internet of Things that aims at providing wireless
4
internet connectivity at low data rates and with a low duty cycle. The protocol stack of 6LoWPAN
is explained by the authors in [6]. Though 6LoWPAN can solve the problem of the construction of
the access network, it introduces the following challenge:
• According to the IEEE 802.15.4 standard, the frame size handled by low power devices is 127
bytes, which was much smaller than the frame size of 1280 bytes of an IPv6 packet [7]. The
6LoWPAN adaptation layer takes care of this situation by fragmenting packets, making the
IoT network vulnerable to various fragmentation attacks [8].
The challenge is to build a secure and strong 6LoWPAN-based IoT infrastructure devoid of any
vulnerabilities, which can withstand possible security attacks.
Among all the significant challenges, security is of utmost importance and a momentous problem
in the Internet of Things environment. Like any other network of computing systems, IoT is sus-
ceptible to attacks. The fact that IoT involves devices used in personal space, critical machinery,
critical operations, etc. and the enormous scale of the connected devices make security particularly
challenging. In the following subsection, we elaborately discuss the issue of security in IoT networks.
• October 2016’s infamous Mirai botnet attack caused massive Internet outage through hacking
devices like CCTV cameras in the Internet of Things. Trend Micro, a global leader in cyberse-
curity solution, reported in the first quarter of 2020 that Mirai botnets and its newer variants
continue to intrude into the IoT environment and deliver malicious payloads.
• According to the Threatpost report of 2020, a security news portal, retail IoT devices like
smart deadbolts, smart cameras, smart toys, baby monitors, security systems, etc. from
various manufacturers like U-tech, i-Home, TP-link, etc. are used as bots and ransomware by
the attackers.
• In the past couple of years, several incidents of intrusion of personal space in hotels and
Airbnbs using connected security cameras have been reported.
• The news agency CNN reported at the beginning of 2020 that Japanese officials found around
200 million IoT devices in the country with poor or little security were sniffing out data.
5
IoT is vulnerable to attacks for several reasons. IoT devices are constrained, which makes it difficult
to implement complex security solutions on them. Communication is wireless, with devices placed in
locations that cannot be frequently accessed. These characteristics of IoT itself makes it vulnerable
to breaches in privacy and security. The authors in [11], [13] have divided the flow of data in IoT into
five phases, namely, Interaction phase, Information collection phase, Processing phase, Presentation
phase, and Information dissemination phase. Security attacks and threats to privacy may occur at
any of the five phases of IoT [11], [13]. The authors in [10], have stated that according to a study by
Hewlett Placard, 80% of the IoT deployment violates personal information privacy, 80% failed the
requirement for a strong password, 70% had un-encrypted communication and 60% had vulnerabilities
at the user interface. Eyal Ronen et al. in [14] established how a simple IoT device like an LED
can launch attacks and cause harmful effects. In [15], the authors stated the inability of various
Public Key Infrastructure (PKI) to meet all security and privacy aspects of IoT. In [16], the authors
proposed a security framework based on the three-layer model of IoT architecture. For analyzing all
aspects of IoT security, the elements and protocols used at each layer of the IoT architecture must be
examined against security challenges. This becomes even more complex and challenging as there is
a lack of consensus among stakeholders towards the technical definition, the standards and the user
policies [17].
Manufacturing organizations, oil and gas companies, the aviation industry, and the military have
been using concepts similar to IoT like Cyber Physical Systems and Supervisory Control and Data
Acquisition systems for years to connect things. While IoT is inclusive of these systems and adds
new dimensions and ability to them, IoT is also vulnerable to the added threats, as suggested by
the authors in [18]. Bonnie et al. in [19] suggest that threats to supply chain security have emerged
from connecting machines to the Internet and introducing complex IoT-based systems controlling
manufacturing processes. These attacks may alter system configuration files, remote access devices,
etc., which in turn may affect the quality and cost of manufacturing or disabling the manufacturing
process. IoT in the healthcare domain helps in the continuous monitoring and health analysis of
patients. However, IoT devices pose challenges as they are open to security and privacy breaches
through their wireless interfaces [20]. An attack may update the device parameter, firmware, or
status, which may have a critical effect on the patients’ health.
Large-scale deployment of LLN having strong resource constraints and constrained transmission
links with diverse traffic pattern in IoT, poses several challenges with regard to using an appropriate
routing protocol. Existing routing protocols are not suitable to deal with these requirements [23].
At the routing layer, the Routing Over Low power and Lossy networks (ROLL) working group has
proposed a protocol called the Ipv6 Routing Protocol for Low power and Lossy Networks (RPL) [22].
RPL, despite its various advantages, has several security issues and is vulnerable to several attacks
[21]. Hence, an IoT network needs to have a holistic system to address RPL attacks. Based on the
6
existing literature, we present a consolidated picture of the complete taxonomy of attacks on the
Internet of Things in Figure 1.1. We have classified attacks in IoT based on the following categories:
• Deficiency of data ownership and its implications for security and privacy [1], [4].
• Insufficient security and threat analysis [4], [6], [23], [24].
• Inadequate Preventive Measures against security attacks [4], [6].
• Need for an adaptive mechanism for the quick recovery of IoT network under attack [4], [9].
• Lack of mechanisms to address protocol vulnerabilities [6], [21].
• Dearth of lightweight protocols to address security concerns of LLN in IoT [23], [24].
• Essential holistic security framework [16].
Based on the research gaps identified as above and the security challenges presented in Subsection
1.2.4, we understand that the security attacks in IoT are of major concern. It has been observed that
the attackers use network devices like routers and leverage the routing protocols’ vulnerabilities. It
has been also seen that attacks on routing protocols have led to several DoS attacks in recent times.
In IoT, the Low power and Lossy Networks (LLNs) are most susceptible to attacks because of their
constrained nature. As mentioned in Subsection 1.2.3, 6LoWPAN is used as an adaptation layer in
IoT to make non IP devices IP-enabled. 6LoWPAN also helps in integrating the traditional WSN in
IoT [25]. RPL has become the de-facto standard routing protocol used in IoT-LLNs. It supports all
the traffic flow requirements and routing requirements of LLNs in various applications like industrial
automation, home automation, building automation, etc. [22]. However, since the inception of RPL,
it has been under scrutiny for being susceptible to several routing attacks. Recently researchers have
raised concerns regarding RPL supported IoT-LLNs being susceptible to performance degradation,
traffic disruption, resource exhaustion, etc., due to the vulnerability of the RPL routing protocol to
security attacks [26], [27], [28]. In order to secure the IoT environment, routing security should be in-
corporated into the framework of IoT security [29]. Routing attacks have implications at the network
layer and over higher layers of the IoT stack. The existing literature on RPL attacks attempts to
provide countermeasures for various routing attacks in isolation. However, the following three major
aspects are not well explored in the existing literature. First, it is essential to find the correlation
between different attack scenarios and analyze the behavior of collaborative routing attack scenarios.
Second, existing taxonomies on RPL attacks have ignored the network partitioning attack scenarios
[21], [30]. IoT devices connect to IoT applications via the edge routers (root nodes) in the IoT-LLNs.
Malicious IoT devices may instigate attacks to partition fair IoT devices from the root node. Thus,
making the sensed information by the fair IoT devices unavailable to the IoT application. Third,
IoT necessitates constant connectivity to the Internet, which gives scope for data analytics. Thus,
we can use advanced technologies like Machine Learning, Deep Learning, Blockchain, etc. to detect
the routing attacks early. Keeping in mind these aspects, we aim to develop a holistic system that
can identify various RPL attack scenarios and take measures to counter them.
8
To summarize, security, privacy, and trust management are critical to the success of IoT and
to reap the benefits which IoT brings to organizations, businesses, enterprises in particular, and our
day to day life in general. With recent reports of IoT attacks using simple home routers and IoT
devices, it is evident that vulnerabilities of routing protocols in IoT are alarming [31]. Based on these
observations, we present the problem of routing security in the following section.
• Objective 1: Perform analysis of the RPL routing process to develop vulnerability assessment
models in order to analyze collaborative attack scenarios and deduce uncovered attack surface.
• Objective 2: Develop a framework incorporating deep learning and smart contract fortified
blockchain to detect routing attacks in RPL-based IoT-LLNs.
• Objective 3: Devise strategies to enhance the RPL routing process to restrict routing attacks
in the IoT environment.
Our work focuses on securing the IoT-LLNs from the attacks resulting from the vulnerabilities
of the RPL routing protocol. Routing constitutes the backbone of the communication stack. Attacks
exploiting the weaknesses of the RPL routing process have implications for constrained network
resources and network performance in the IoT [32]. Thus, it is highly desirable that the IoT ecosystem
quickly identifies an attack and take appropriate countermeasures. An intelligent analysis of the
state of the IoT-LLNs by using machine learning and statistical algorithms can help in the early
detection of routing attacks. Such computationally intensive attack detection can be done on cloud
platforms. However, cloud-based solutions will have limitations like increased latency, high bandwidth
cost, connectivity issues, etc. [33]. Recent research suggests using the edge network to overcome
9
1. Sequence of possible exploits an attacker device may pursue to achieve its target.
2. The expected behavior of a vulnerability and the resultant change in the state of IoT
network.
3. The risks involved in terms of resource consumption, resource damage, and performance.
• Attack instigation and symptoms: The method of instigation of various routing attacks
and the analysis of their consequences helps in the behavioral analysis of the attacks and their
effect on the IoT network. The behavioral analysis helps in the design and testing of efficient
attack detection mechanisms.
• Detection of attack symptoms and source: As IoT ensures constant Internet connectivity,
IoT-LLN data can be pulled to the edge network or cloud. In such HPC environments,
advanced technologies like Artificial Intelligence and Deep Learning can be applied for the
behavioral analysis of IoT-LLNs for attack detection and attack source identification.
10
• Risk and threat reduction: A detailed study of the RPL routing process through the
prism of vulnerability models may help uncover hidden attack surfaces and recognize unre-
ported attack scenarios. A careful analysis based on vulnerability assessment models may
help enhance the existing RPL routing process to reduce security risks and threats. However,
such enhancements should not compromise the RPL routing process and should never increase
energy consumption or communication overhead.
• Secure access of routing communication and IoT data: Behavioral analysis of the IoT-
LLNs for attack detection using Artificial Intelligence and Deep Learning at the edge network
or the cloud will be fruitful only when we have secure access to the IoT data.
• In Chapter 2, we discuss various routing requirements of the IoT network and the rationale
11
behind the suitability of RPL as the de facto routing protocol in the IoT environment. We
briefly explain the working of the RPL routing process and present an in-depth study on
the existing literature of routing attacks in the RPL-based IoT network. We also study the
existing attack detection mechanisms.
• In Chapter 7, we propose some novel enhancements to the existing RPL to reduce the threat
associated with two crucial routing attack scenarios. We also recommend an enhancement to
RPL to deal with malicious node isolation and blacklisting.
• We give our concluding remarks along with the future scope of work in Chapter 8.
1.7 Summary
The constrained nature of the devices that constitute the IoT-LLNs poses various infrastructural and
operational challenges. Security is a major challenge in the IoT environment. The recent series of
attacks targeting the IoT environment emphasizes the fact that routing security is challenging and
crucial. In this Chapter we gave an introduction to the challenges of securing the Internet of Things
environment and identified routing protocol security in IoT-LLNs as the focus of our work. We gave
a description of the problem definition and the objectives of the research. In the next chapter, we
perform an in-depth study of existing literature on RPL and also the attacks in RPL-based IoT-LLNs.
12
Chapter 2
“If Internet of Things is the solemnization of the physical world with the digital world,
routing security will keep the union alive, interacting and inviolable.”
2.1 Introduction
The driving force behind the concept of the Internet of Things is the connectivity among physical
devices. Networking and specifically routing is the key enabler of connectivity. The large scale of
IoT networks, the constrained and the heterogeneous nature of the constituent devices pose specific
requirements on the underlying routing protocol. The proliferation of the IoT devices in day-to-day
usage in platforms like healthcare, finance, and retail involves the communication of private data.
Therefore, the secure exchange of data among the IoT nodes should be an intrinsic feature of any IoT
network. In Chapter 1, we discussed various challenges present in the IoT environment and observed
that security is a major concern.
In the past, as well, routing protocols were known to be susceptible to multiple threats and attacks.
Additionally, the constrained nature of the IoT devices make the implementation of complex security
solutions challenging. Moreover, the rush of IoT vendors to push their products in the IoT market
space has resulted in the security features getting compromised in the already constrained IoT devices.
The network of such minimal IoT devices termed as Low power and Lossy Network (LLN) easily
becomes a soft target for attackers, enabling them to exploit the vulnerabilities of various aspects
of IoT-LLN. Secure routing in IoT-LLN is a vital requirement and major challenge in enabling the
vision of IoT. Numerous researchers have expressed concern about the routing issues in IoT-LLNs and
stated routing security in IoT-LLNs as an open research problem [26], [27], [28]. In this chapter, we
focus on exploring the various threats posed by routing protocol vulnerabilities in IoT environment
and study the existing work on them.
The rest of the chapter is organized as follows. In Section 2.2, we briefly present the routing
requirements of IoT-LLNs and the working of the RPL routing process. We illustrate how RPL
satisfies the routing requirements of IoT-LLN and discuss the vulnerabilities of RPL to insider attacks.
In Section 2.3, we present the related work on routing attacks in RPL-based IoT-LLNs. In Section
2.4, we discuss the research related to the enhanced versions of RPL that aim to overcome some of
13
1. Sink or root node: It connects the IoT-LLN with the rest of the IoT network. It is usually
a gateway or a border router which is also responsible for the topological formation and
maintenance of the IoT-LLN.
The goal of the sensor and actuator devices in the IoT-LLN is to transmit data or receive command
from an IoT application. The sensor devices fail to achieve this goal, if they are not connected to the
sink node either directly or via the intermediate nodes.
14
To organize the nodes in the form of DODAGs, RPL makes use of three types of control
messages namely, DODAG Information Object (DIO), DODAG Information Solicitation (DIS) and
DODAG Advertisement Object (DAO). The sequence diagram shown in Figure 2.1 depicts how and in
which order the control messages are used by RPL to organize the nodes in the form of a DODAG. As
Figure 2.1: Flow of Control Messages for DODAG Maintenance and Formation
observed from Figure 2.1a, the sink node broadcasts the DIO messages at regular intervals determined
by the trickle timer algorithm and the nodes respond with a DAO message. DIO messages carry
DODAG configuration parameters which are used by the nodes to construct DODAGs and join them.
The trickle timer algorithm enables the nodes in the LLN to exchange messages in an energy efficient
manner. The trickle timer periodically checks for new information available within the LLN, checks
for inconsistency and enables the control of traffic timing, route discovery and multicast propagation
[46]. The DAO message sent by the sensor nodes provides the destination information to the sink
node. Using the DAO message, the sink updates its topological view of the DODAG as represented
in Figure 2.1b. A new node multicasts a DIS message to its neighboring nodes in order to obtain the
network configuration parameters. In response, the neighboring nodes send the DIO messages which
include their specific rank along with the network configuration parameters. Rank is a value which is
estimated in terms of an Objective Function, which governs the structure of the DAG. The objective
function comprises the routing metric and constraints, which are advertised by the sink node in the
DIO message [47]. The rank of a node represents the quality of the path to the sink that the node
offers to its child node. Hence, rank facilitates the selection of the best route to the sink node. A
low rank implies a better route to the sink in terms of the routing metrics and constraints defined
by the goal of the LLN. A new node chooses a parent node with the best rank by responding with a
DAO message. The parent node is supposed to forward this DAO message to the sink node in order
to allow the sink to have the view of this new node. Hence, we can infer that a sink node can reach
or have the view of a specific node only if it receives a DAO message from that node. The message
exchange scenario involved in this process is depicted in Figure 2.1b. A new node computes its rank
based on the rank of its parent node as represented by Equation 2.1.
where Rankincrease is estimated based on the property of the link between a node and its parent node.
Hence, the rank of a node is always greater than its parent node. Thus, RPL enables efficient tree
topology formation in the form of a DODAG. RPL has a well defined mechanism to maintain a loop
free spanning tree topology. It facilitates local repair mechanism without affecting the entire network.
It also ensures optimized LLN performance against various requirements like energy conservation,
minimum latency and load balancing by using different routing metrics and constraints like Remaining
Node Energy, Expected Transmission Count, Hop count, Throughput and Latency. RPL achieves
these requirements by broadcasting the suitable objective function and parameter information in the
DIO message as shown in Figure 2.2.
The sink node is responsible for updating the configuration information in the DIO message. The
nodes in the LLN which join as sensors with routing capability also multicast the DIO messages after
updating the rank field in the DIO message with their own rank. However, such nodes should not
update any other parametric value like the version number, Mode of Operation (MOP) and the values
of various flag variables in the DIO messages. Also, the nodes should not advertise false information
like false identity or false rank in their DIO messages.
In the following subsection, we discuss various routing requirements of LLNs in the IoT environment
and illustrate the properties of RPL that help satisfy those requirements.
1. Scalability: Most of the IoT applications like Connected Health, Smart Campus, Smart City,
etc. require the deployment of IoT-LLN nodes in a large and diversified scale. The routing protocol
should have the ability to organize such large numbers of IoT-LLN nodes and must allow scaling
the network without compromising the behavior of the selected performance parameters. In RPL,
a node interacts with all the nodes in its radio (communication) range. RPL adopts the Unit Disk
Graph Model, where a circular disk with the co-ordinates of the embedded device as the center of
the circle represents the radio range of the device. Nodes disseminate configuration information at
16
configuration information. Thus, all the nodes in the LLN receive the notification of the configuration
update.
4. Support for Directed Information Flow: IoT applications require the collection of infor-
mation sensed by sensor nodes at specific servers. This necessitates the routing protocol to facilitate
a highly directed information flow through suitable addressing schemes. In RPL, all the sensor
nodes must forward their data to the sink node. The traffic close to the sink node, i.e., a 6LBR is
high and may result in load imbalance. To this end, RPL allows the LLNs to have multiple sink nodes.
6. Energy Efficient Routing: The constrained IoT nodes often rely on battery power and lack
continuous power supply. Therefore, the routing process must be energy efficient. RPL ensures en-
ergy efficient routing by the use of trickle algorithm, which governs the frequency of dissemination
of control messages within an interval [Imin , Imax ]. When nodes agree with the neighboring nodes in
terms of configuration information, they reduce their frequency of information dissemination. Such
a scenario also reflects that the topology is stable.
7. Network Dynamicity: There is frequent association and disassociation among the nodes in
IoT-LLNs. Hence, the routing protocol must facilitate mechanisms to ensure the existing nodes in
the LLN are informed of the changing association, disassociation and disappearance of the neigh-
boring nodes. To this end, the sink node broadcasts DIO messages at intervals governed by trickle
algorithm.
8. Latency: Numerous IoT applications require the IoT-LLNs to be designed as a type of de-
lay tolerant network with an exception to alert and queried reporting [49]. However, RPL allows the
latency object to be used as path metric or constraint to minimize the latency from the source to
the destination
9. Diverse Traffic Patterns: Devices in the LLNs may require to establish a point to point,
multipoint to point or point to multipoint communication. RPL supports anycast, unicast, and mul-
ticast communications.
10. Security: IoT-LLNs are exposed to threats like any other network. The wireless, distributed,
large scale and constrained nature of the LLNs increases the spectrum of potential risks. Nodes with
routing capability participate in the topological organization, can self configure, self organize and are
18
capable of violating the protocol rules by disabling, manipulating or hijacking the routing process.
Therefore, a new node must be authenticated by the routing protocol before it can act as a router.
Further, the routing process should support mechanisms to defend Denial of Service (DoS) attacks,
Distributed DoS (DDoS) attacks and energy depletion attacks.
RPL supports three security modes namely, unsecured mode, pre-installed mode and authenticated
mode. In the unsecured mode, the control messages are unencrypted and security is taken care of by
the link layer security feature. In the pre-installed mode, the nodes joining a network must obtain
a pre-installed encryption key. Using this key, a node can join the network as a host or as a router.
In the authenticated mode, a node can join a network as a host using the pre-installed key. To
become a router, the node should obtain an authentication key from an authentication server. The
pre-installed mode and the authenticated mode prevent unauthorized devices to become a part of the
IoT-LLNs or participate in the routing process. This ensures the security of the IoT-LLNs against
external attacks but poses additional requirement of protocols defining the process of obtaining the
key, and this places additional computational overhead on the constrained nodes.
Also, the concept of RPL instances introduces access restrictions among the nodes belonging to
different DODAGs within an RPL instance. The nodes belonging to different DODAGs within an
RPL instance cannot establish communication. However, nodes belonging to separate RPL instances
can establish communication. The notion of RPL instances also allows the flexibility to choose dif-
ferent route selection metrics of different DODAGs within an RPL instance.
All the security features mentioned above restrict external attacks in RPL-based IoT-LLNs. How-
ever, RPL-based IoT-LLNs are vulnerable to insider attacks, which we elaborate in the following
subsection.
2. Exposing the vulnerabilities of the routing protocol to check the possibility of new attack
scenarios
19
3. Mechanisms to detect the state of the IoT-LLNs to ensure that the network is not under attack
4. Improving the routing process and functions involved to mitigate the routing attacks
In the following subsections, we present the existing literate based on the above classification.
have studied sinkhole attack, which is a combination of decreased rank attack and packet dropping
attack. Decreased rank attack can also act as a precursor to wormhole attack where a malicious node
after gaining access to the maximum possible traffic, establishes a tunnel connection with a node
outside the DODAG in order to pass on the DODAG configuration and traffic information [71], [72].
Therefore, timely detection of the decreased rank attack is vital for safeguarding the IoT-LLNs.
Blackhole Attack
When a node drops all the received packets, it is said to be instigating a blackhole attack. In such
scenarios, when the sink node does not receive data packets from the victim node, such victim nodes
are said to be topologically isolated from the sink node.
Blackhole attacks have major impact on all types of sensor networks which include MANETS, delay
tolerant networks and wireless sensor networks [75], [76], [77]. Blackhole attacks against RPL in the
low power and lossy sensor networks cause major denial of services in IoT environment. The study
of the consequences of blackhole attack by the authors in [21], [78] suggests that blackhole attacks
reduce the overall network packet delivery ratio and increases the exchange of control messages. It
also states that the attacked network behaves similar to a normal network. Topological isolation in
IoT may be caused by obstructing the upward traffic or downward traffic. Downward traffic obstruc-
tion is possible only if the RPL operates in storing mode [22]. Upward traffic obstruction caused by
blackhole attacks can be executed in both storing and non-storing modes. Various researchers have
suggested a trust based defense mechanism against blackhole attacks in different types of wireless
sensor networks [77].
The authors in [79], [80] have also applied a trust based mechanism to defend RPL against
blackhole attacks. The trust based mechanism works in two levels, first at the local level where a
sensor node observes the behavior of the neighboring nodes. At the global level, i.e., at the sink level,
22
a trust value is estimated for all the nodes in the network. Most of the IoT devices are constrained
and have low memory and processing capabilities. The limited memory and processing power are
used for maintaining the routing information and queuing the data packets to be forwarded. De-
tection of the blackhole attack can be done at the global level without putting additional load on
the constrained node by learning the packet delivery trends of various nodes in the LLN. In [81],
the authors have compared trust based, agent based, multihop and check-sum based mechanisms
to counter the blackhole attack. They have suggested that these mechanisms work only in specific
cases. They also stated that cryptographic solutions cannot be applied on constrained nodes.
DIS Flooding
When a node broadcasts a frequent burst of DIS messages, it is said to have instigated a flooding
attack [21]. The neighboring nodes suspend their data forwarding activity to respond to the frequent
23
DIS request. Consequently, the victim nodes not only become unavailable but also suffer from
depletion of battery power, and the network experiences congestion and a drop in packet delivery
ratio [86], [87]. A suggested workaround is to discard the DIS from nodes that exceed predefined
thresholds of the number of DIS bursts and the interval between the consecutive DIS messages, and
blacklist all non-adhering nodes [86], [88]. Such mechanisms reduce the impact of the attack but may
end up blacklisting nodes that genuinely suffer from weak links and cannot connect to the IoT-LNN.
DAO Flooding
A malicious node may flood DAO messages to advertise false routes and overload the routing table
of its parent node [21]. RPL generally operates in non storing and storing modes. In the storing
mode, each node in the DODAG maintains a routing table of the downward routes where as in the
non storing mode, all the nodes in the DODAG send traffic to the sink and the sink uses the source
routes to send traffic to the leaf node. In the storing mode, the RPL provides an optional header
field, forwarding error flag in the DAO, to clean up the stale roots. A malicious node can manipulate
this flag which results in the valid downward routes being discarded [107].
DIO Flooding
Frequent replay of DIO messages can also impact the network. Pericle et al. in [89], have explored
the DIO suppression attacks in which a malicious node intercepts an old DIO and keeps replaying
it, which makes the victim nodes suppress their DIOs as they believe there is no new information
to share. As a result, nodes in the subtree of the victim nodes are unable to receive the updated
DODAG configuration which results in the sub-optimized performance of the LLN. Although Pericle
et al. also stated that DIO suppression attack may lead to network partitioning, they did not explore
the partitioning phenomenon. Authors in [90], have studied that RPL does not behave as expected
under partitioning. This happens because, the sensor nodes do not maintain the list of unreachable
nodes and no neighboring node is marked as unreachable even after it is discarded as a preferred
parent. This means, a node which is in the neighborhood but should not be a preferred parent may
be later chosen as a parent node. This situation may lead to formation of loops in the DODAG
which mostly results in partitioning [91]. The scenarios which lead to partitioning of the IoT-LLN
need further exploration.
• RPL enhancement that aims to improve some performance aspect of the routing process.
• RPL enhancement that aims to improve some security aspect of the routing process.
In the following subsections, we present the existing literature based on the above classification.
2.5 Summary
The properties of RPL like provision for diverse traffic patterns, scalability and parametric con-
strained routing make it the de facto routing protocol for the low power and lossy networks in the IoT
environment. However, the vulnerabilities of RPL against routing attacks require attention. Though
most of the attacks find mention in the existing literature, partitioning attacks in the IoT-LLNs have
more scope for research. In particular, representation of attack instigation and consequences in the
form of robust models are missing.
The existing analysis and detection mechanisms provide solutions for a particular type of routing
attack. Nevertheless, the IoT-LLNs may suffer from multiple attacks, which requires a holistic tool
for detecting the state of the network. IoT has evolved from similar technologies like the Machine to
Machine environment and the SCADA systems. The additional features that IoT brings to the table
are scale, heterogeneity, and analytics. The power of technologies like machine learning, AI, and
Blockchain has remained untapped for enhancing routing security in IoT-LLNs. These technologies
can be precise in identifying the state of the network and the presence of malicious actors.
Further, what is required is to incorporate isolation mechanisms in the routing process to weed
out the identified malicious actors. The rank property is specific to RPL. Existing literature suggests
some mitigation mechanisms for increased rank attack and decreased rank attack. However, there
is scope for research in designing a robust detection and mitigation mechanism for worst parent
attacks. In Chapter 3, we propose an Attack Graph-based model to assess the vulnerability of the
rank property of RPL in IoT-LLNs. We also present a Mind Map model to assess the vulnerability
of the RPL routing process.
26
Chapter 3
“Only when we are brave enough to explore the darkness will we discover the infinite
power of our light.” -Brene Brown
3.1 Introduction
The study of the related literature, as discussed in Chapter 2, leads to the understanding that
routing security in IoT-LLNs is an open research problem. Also, IPv6 Routing Protocol for Low
Power and Lossy Networks (RPL) is the most popular and apt routing protocol for IoT-LLNs as
it suffices all routing requirements. Securing the RPL routing process in the Internet of Things
(IoT) environment encompasses three significant activities. First, to assess the vulnerabilities of
the underlying routing protocol. Second, devise efficient mechanisms to detect anomalies resulting
from the routing protocol’s weaknesses and third, to devise proactive measures for reducing the risk
associated with routing attacks. In this chapter, we focus on building vulnerability assessment models
to estimate the risk associated with the routing process in IoT-LLNs. Vulnerability assessment is the
process of defining, identifying, classifying, and prioritizing vulnerabilities in a system, application,
network protocol or infrastructure. It is the process of providing an assessment to understand the
risks existing in the environment in order to react appropriately [111]. Network protocol vulnerability
assessment helps to assess the security strengths and weaknesses of the network protocols. The
primary objective is to find the vulnerabilities of the IPV6 Routing Protocol for Low Power and
Lossy Networks (RPL) that can compromise the overall security and operations of the IoT network.
The assessment furnishes inputs to the design of security policies and mechanisms. Vulnerability
assessment may be performed using automated scanning tools or models. An assessment using
formal models is a good precursor for a good security framework. We propose two robust models
based on the concept of Attack Graph and Mind Map for assessing the vulnerabilities associated with
RPL routing protocol in the Internet of Things.
The rest of the chapter is organized as follows. In Section 3.2, we present the proposed classification
of vulnerability assessment models. In Section 3.3, we describe the proposed Attack Graph-based
27
vulnerability assessment model and validate the model in Section 3.4. In Section 3.5, we present the
Mind Map-based vulnerability assessment model, and in Section 3.6, we enumerate the metrics for
vulnerability analysis of RPL-based IoT networks.
• Based on RPL Features: As mentioned in Chapter 2, RPL performs the topological organi-
zation and maintenance of IoT-LLNs by exchanging control messages among the IoT devices.
The DIO control message carries values of parameters like rank, version number, and other
flag variables that govern the optimal topological organization of IoT-LLNs. A category of
vulnerability assessment models could be those that analyze how these parameters can be
exploited to instigate attacks. In our work, we propose an Attack Graph based vulnerability
assessment model to examine the vulnerabilities of the RPL rank property.
• Based on the Routing Steps: A malicious actor can also exploit the vulnerabilities of the
routing process, i.e., the steps involved in the topology formation. To this end, we examine
28
the RPL routing process’s vulnerabilities through the proposed Mind Map-based model.
As Low Power and Lossy Networks (LLNs) in IoT have evolved from Wireless Sensor Networks,
they have also inherited several routing attacks prevalent in WSNs. Thus, RPL attacks may be
classified into two categories: a) Attacks specific to RPL features, and b) Attacks inherited from
WSN as depicted in Figure 3.2 [113]. The first proposed model based on Attack Graphs analyzes
the impact of RPL specific attacks and how these attacks worsen the WSN inherited attacks in
collaborative attack scenarios. The objective of the proposed second approach, called Mind Map
model, is to scrutinize the RPL routing process and create a list of vulnerabilities associated with
each routing instruction. The Mind Map model will help in anticipating novel attack scenarios and
assist in better preparedness for zero day attacks.
• RPL instance ID: It identifies an RPL Instance in a Low power and Lossy Network. An
RPL instance may comprise one or more DODAGs where each DODAG makes use of the same
objective function.
• DODAG ID: [RPL instance, DODAG ID] identifies a unique DODAG in an RPL instance.
• Version Number: [RPL instance, DODAG ID, DODAG Version Number] identifies a unique
DODAG in a network.
The rank plays a vital role in the construction of the DODAGs. The rank property governs the
Neighborhood Discovery, Data Path Validation, and Loop Detection mechanisms in RPL. A node
within a DODAG estimates its rank based on the objective function, which is a function of the parent
node’s rank and a routing metric as given by Equation 3.1.
where,
• Rincrease is an estimated value based on one or more routing metrics and constraints as
advertised by the root node.
Equation 3.1 also brings forth the following notions associated with the rank property in RPL:
1. The rank of a child node must always be greater than the rank of its parent node.
2. Ranks strictly increase in the downward direction in a DODAG , i.e., the root of the DODAG
has minimum rank and leaf nodes have the maximum rank.
3. From a given set of candidate parent nodes, a child node selects a node with the minimum
rank as its parent.
Adhering to the above notions of rank property ensures the loop free construction of the DODAG,
a stable topology as well as an optimized network performance. Non adherence of the above notions
leads to several attacks.
attack, it can further gain the potential to strengthen the WSN inherited routing attacks as well.
States T1-T4 and state R in Figure 3.3 represent various goals of an attacker node. States S1-S9
are the states of the IoT-LLN, which may undergo changes as a result of the exploitation of the rank
property. Once a malicious node intrudes the network by compromising the node authentication
defense mechanism, it can instigate several internal attacks by exploiting the weaknesses of RPL.
As depicted in Figure 3.3, routing attacks in RPL-based IoT-LLNs can be RPL specific attacks or
attacks inherited from characteristics of WSNs. The following are the RPL specific attacks explored
by the proposed Attack Graph model.
Attack (DRA) as shown by the state S2 in Figure 3.3 and disrupts the optimal traffic paths
in the IoT-LLN. The malicious node successfully achieves its goal of traffic misappropriation
as depicted by the final state T1 in Figure 3.3.
2. Worst Parent Attack: A malicious node may violate notion 3 of the rank property by
selecting a parent with a higher rank instead of a parent with the minimum rank. In order to
introduce a delay in the sensor data reaching the root node, the malicious node selects a sub
optimized path to the root node. Thus, the malicious node instigates a Worst Parent Attack
(WPA) depicted by state S3. The malicious node keeps selecting sub optimized paths to the
root, thus resulting in network sub optimization as depicted by state T3 in Figure 3.3.
We next explain the attacks explored in the proposed Attack Graph model inherited in the IoT-LLN
environment from the characteristics of the WSNs. The following are the WSN inherited attacks
that are intensified by the RPL specific attacks in IoT-LLNs.
(a) Sniffing Attack: A malicious node instigating DRA attracts significant network traffic
and thus gains the potential to instigate a potent sniffing attack as represented by state
S5. Through the information gained from sniffed packets, a malicious node can achieve
insight about the neighboring topology and identity information of the neighboring nodes
which can lead to Traffic Misappropriation (T1) as shown in Figure 3.3.
(b) Identity Attack: Using the information gained from sniffed packets, a malicious node
can instigate an Identity attack as shown by the state S9 in Figure 3.3. If the malicious
node clones the sink node, it can gain control over the entire network topology thus
compromising the traffic (T1) as shown in Figure 3.3.
32
(c) Blackhole Attack: A node instigating a blackhole attack drops all the received packets.
A malicious node instigating a Decreased Rank Attack (S2) may further drop all the
received packets to create a blackhole represented by the state S6. A blackhole attack
preceded by DRA results in huge loss of data packets leading to Network Isolation as
depicted by the final state T2.
(d) Sinkhole Attack: A malicious node can create a sink by attracting maximum data
as well as control packets towards itself and then it modifies or drops these packets. A
sinkhole attack can be easily executed by instigating a DRA. A sinkhole attack depicted
by state S7 leads to topological modifications and degraded network performance as
shown in Figure 3.3.
2. DAG Inconsistency Attack: A malicious node instigating an IRA may easily create a DAG
Inconsistency Attack scenario by setting the rank error flag (R) and direction flag (O) in its
DIO message. This scenario is depicted by state S8 in Figure 3.3. The DIO messages carry
flags R and O for data path validation. The R flag is set by the forwarding node when it
receives a packet from a node with higher rank with set flag O. A set flag O indicates that
the packet should be forwarded to a child node. The receiving node interprets this as DAG
inconsistency and resets the trickle timer. This leads to increased dissemination of DIO and
DIS messages.
• IRA increases the average number of control messages multicasted by nodes in the DODAG.
• The sink node receives 3 to 4 times more number of data packets from the malicious node in
comparison to the other nodes.
• The malicious node, its parent and all the nodes in its sub-DODAG consumes an increased
amount of listen and transmit power. As a result, the average power consumption of the
network increases.
• Average Inter Packet time of the malicious node and all the nodes in its sub-DODAG reduces.
• Beacon interval of the malicious node and all the nodes in its sub-DODAG reduces and is
much less in comparison to the Beacon interval of other nodes present in the DODAG.
From the observations depicted in Table 3.1, it may be concluded that Increased Rank Attack results
in unwarranted resource consumption as depicted in the Attack graph of Figure 3.3. Also, these
observations can be used in designing a detection mechanism for the Increased Rank Attack.
initiated on the 4th minute of simulation. Prior to the attack, the attacker node (Node 30) has no
child node as shown in Figure 3.5a. After the attack is initiated, the topology changes and Node 30
has 22 nodes in its sub-DODAG as shown in Figure 3.5b. Following are the observations made from
• The topology changes due to DRA which results in increase of Expected Transmission Count
(ETX) of the affected nodes. For example, the ETX of Node 9 increases by 20 after the attack
as observed in Figure 3.5b, leading to network sub optimization.
• The convergence of traffic towards the attacker node , i.e. Node 30, as shown in Figure 3.5b,
results in traffic disruption.
• Though there is not much change in the network’s average power consumption, the attacker
node’s power consumption increases as it handles more traffic.
• Listen and Transmit duty cycle of the attacker node is twice that of most of the nodes in the
DODAG.
On instigating DRA, Node 30 attracts a huge chunk of traffic towards itself. Thus, Node 30 acquires
the potential to cause a huge disruption of the network traffic. Further, if Node 30 instigates a
Selective Forwarding Attack, it results in huge packet loss, as shown in Figure 3.6. When the
Decreased Rank Attack is activated at the 4th minute of the simulation, there is a loss of a few data
packets. On the 7th minute, when the Selective Forwarding Attack is instigated, the number of lost
data packets increases drastically. The attacker node can use the header information to instigate
sniffing and identity attack.
Thus, we can conclude that Decreased Rank Attack results in traffic compromise, network sub-
optimization and network isolation as depicted in the Attack Graph.
35
in network sub-optimization and in specific scenarios may also lead to network isolation as shown in
the attack graph.
36
integration of LLNs in the IoT environment it is important to secure notions related to rank property
and keep track of nodes changing their rank or preferred parent.
• DODAG Advertisement: The DODAG root advertises the configuration of the DODAG
by broadcasting DIOs governed by a trickle timer. DIOs carry information like, the supported
37
Figure 3.9: Mind Map based Vulnerability Assessment of Node Joining and DODAG
Maintenance Process
38
objective functions used for rank estimation of the nodes, trickle timer’s maximum and mini-
mum interval values, trickle redundancy constant and the version number.
• Nodes Joining: A new node that is ready to join a DODAG undertakes tasks (depicted in
Figure 3.9) as follows:
1. Transmit DIS: The new node multicasts DIS messages periodically to trigger Step1-
Action1 i.e., to reset the trickle timer of the neighboring nodes as shown in Figure 3.9.
The neighboring nodes, on receiving a DIS message from the new node, respond with
a unicast DIO message (Step1-Action2). There are two vulnerabilities associated with
Step1-Action1. A new node may overwhelm the DODAG by transmitting excessive
DIS messages which increases the processing, listen and transmit power consumed by
neighboring nodes leading to Step 1-Action 1-Vulnerability 1, i.e., exhaustion of power
and also these nodes have to suspend their data packet transmission (Step1-Action1-
Vulnerability2) in order to process the incoming DIS request. Step1-Action2 also poses
the risk of not allowing a new node to join the DODAG if the neighboring nodes do
not respond to DIS requests (Step1-Action2-Vulnerability1). Moreover, the neighboring
nodes may respond with false DIOs forcing the new nodes to take sub-optimized paths
to the sink (Step1-Action2-Vulnerability2). On receiving DIOs, the new node performs
a quality estimation of the neighbor’s link. To do so, the RPL makes use of a neighbor-
hood discovery mechanism named link probing. In the current context, we refrain from
discussing about link probing since it is beyond the scope of this work.
2. Parent Selection: On hearing DIOs from the neighboring nodes and after performing
link estimation, the new nodes prepare a list of preferred parents which comprises the
same neighboring nodes. The new node then selects the nodes with minimum rank.
At this step, a node may select an inferior parent to degrade the performance of the
DODAG (Step2-Action2-Vulnerability1).
3. Route Registration: On selecting the parent node, the new node joins the DODAG
by unicasting a DAO message to the root node via the selected parent node. On receiv-
ing the DAO, the root node will add the new node to its routing table and may send
an optional DAO acknowledgment to the new node. In this way, the new node regis-
ters itself with the root node. A malicious node may never perform route registration
after obtaining the DODAG configuration through the received DIOs (Step3-Action1-
Vulnerability1). The configuration information can be used by the node to accomplish
malicious objectives like an identity attack.
39
4. Node Advertisement: Once the node is registered with the root, it can advertise its
presence to allow more nodes to join the DODAG. To realize this, the node performs
the following sub-tasks:
– DIO Computation: The node estimates its own rank based on the rank of its se-
lected parent and the specified objective function. The node makes use of the parent
DIO to compute its own DIO by replacing the parent’s rank and address with its
own rank and address. A rogue node may not compute its rank and instead may use
the rank of its parent in order to overclaim it proximity to the sink (Step4-Action2-
Action2.1-Vulnerability1) or may even impersonate its parent node by using the
link address of the parent node (Step4-Action2-Action2.2-Vulnerability2).
– DIO Output: The node now multicasts its own DIO and allows a newer node to
join the DODAG through it. At this juncture, a node may multicast the false DIO
information or replay an old DIO (Step5-Action1-Vulnerability1) or may block the
DIO output in order to restrict the neighboring nodes from joining the DODAG
(Step5-Action1-Vulnerability2).
• DAG Maintenance: This involves Steps 1� - 5 as depicted in Figure 3.9. Nodes which are
already part of the DODAG, constantly maintain the link estimates via probing. Similarly at
regular intervals, governed by the trickle algorithm, the root node broadcasts the DIO messages
to update the configuration information to the nodes in the DODAG. As nodes listen to the
fresh DIO, they perform the link estimation. If new links are available, they again perform
the parent selection, route registration and node advertisement. Through fresh DAOs received
from the nodes, the sink updates its routing table and its view of the DODAG.
Based on the understanding of various possible vulnerabilities, we found that RPL is indeed suscepti-
ble to Network Partitioning Attack. A malicious node can exploit the vulnerabilities Step3-Action1-
Vulnerability1, Step4-Action2-Action2.1-Vulnerability1 and Step4-Action2-Action2.2-Vulnerability2
to instigate a Network Partitioning Attack. The vulnerabilities are highlighted in red color in Fig-
ure 3.9. We further explore the novel Network Partitioning Attack scenario in Chapter 5.
analysis of IoT-LLNs with the goal of detection and mitigation of various routing attacks.
1. Power Consumption: Energy of a node is spent in processing data packets and control
messages (CPU Power, PCP U ), listening to messages from neighboring radios (Listen Power
PListen ), while in sleep mode (Low Power Mode energy, PLM P ) and forwarding self-generated
and received data packets and control messages (Transmit power, PT rans ).
N
�
P ower Consumption = (PCP U + PListen + PLM P + PT rans ) (3.2)
i=1
2. Beacon Interval: A beacon frame comprises DIO message in its payload. Nodes in the
DODAG multicast beacon frames at regular intervals governed by the trickle algorithm to
advertise their presence. Beacon interval of a node is the time gap between two consecutive
beacon frames multicasted by the node. The beacon interval varies between values Imin and
Imax depending on the state of the DODAG. It attains the maximum value Imax when the
DODAG is organized and stable.
3. Routing Metric: Routing metric is a path cost estimation metric used by nodes in the
DODAG to select the best possible path to the sink. Routing metric can be a single or a
combination of predefined link or node metric [52].
5. Average time gap between consecutive packet arrival (ATG): It is the average of
time gap between the arrival of two consecutive packets of any non sink node i in the DODAG
at the sink node over the operational time. The upward latency given by End-to-End Delay
(EED) and latency between two consecutive packets sent by any node i is captured by the
metric “time gap between two consecutive packet arrival (TG)” of node i at the sink node as
can be observed from Figure 3.10.
6. Number of Neighbors: The number of neighbors for any node is equal to the sum of its
immediate child nodes and the parent node.
41
7. Inter-packet Time: The time gap between two successive transmissions by a node is termed
as its inter-packet time.
8. Hops: It is the count of the number of intermediate nodes from the source node which a
packet has to traverse before it reaches the sink node.
9. Network Convergence Time (NCT): It is the measure of the time taken by a group of
routers in a network to reach the state of convergence. A network is said to have achieved the
state of convergence when the routing protocol specific configuration information is available
to all the routers in the network that participate in the topological formation of the network.
10. Network Overhead: It the number of control messages exchanged among the nodes for
topological formation and maintenance of the DODAG.
The power consumption measured in units of milliwatts (mW) and beacon interval, NTC, and ATG
measured in units of milliseconds (ms) as well as timestamps.
3.7 Summary
In this Chapter, we analyzed the vulnerabilities associated with the RPL routing protocol. We
proposed two different models to represent the vulnerabilities related to the RPL routing process.
The proposed Attack Graph-based model gives the insight that the rank property of RPL can be
exploited by a malicious node to instigate several attacks in RPL-based IoT-LLNs. Further, the
proposed Mind Map model helps build an in-depth understanding of the vulnerabilities associated
with each instruction of the RPL routing process. Based on the vulnerability assessments model and
experiments conducted to validate the proposed Attack Graph-based model, we prepared a list of
metrics to analyze the state of the IoT-LLNs, which we use in Chapters 6-7.
In [92], the authors performed an impact analysis of the rank attack. Semedo et al. in [117] per-
formed the vulnerability assessment of RPL’s Minimum Rank Hysteresis Objective, which culminates
to DRA. However, the impact of rank attacks, coupled with other routing attacks, was not analyzed
by them. We observed that the Decreased Rank Attack could be a precursor to routing attacks like
sinkhole attacks, wormhole attacks, and packet sniffing attacks through the proposed attack graph
analysis of the rank property. Recently, authors have proposed taxonomies to study the impact of
routing attacks in RPL-based IoT LLNs [21] [30]. However, such taxonomies do not help in uncover-
ing unreported vulnerabilities of the routing process. The insights gained from the Mind Map model
led to an unreported network partitioning vulnerability in the RPL-based IoT environment that is
further discussed in Chapter 6.
In the proposed Attack Graph model, we have focused on the rank property of RPL as IoT-LLNs
under rank attacks suffer from topological sub-optimization and isolation of victim nodes. Specifi-
cally, Increased Rank Attacks exhaust node resources by accelerating the exchange of control messages
among the nodes in the IoT-LLNs. The Attack Graph-based model does not analyze vulnerabilities
that may stem from exploiting other RPL properties like parent set size and parent switch threshold.
Similarly, the Mind Map model can be made exhaustive by including parent set size and parent
42