Professional Documents
Culture Documents
a r t i c l e i n f o a b s t r a c t
Article history: IoT (IoTs) is a collection of autonomous things. IoTs is a new pattern that includes the existing presence of
Available online xxxx different devices. It is one of the latest technologies that provide global connectivity, management of sen-
sors, users and information. The connectivity helps devices to be connected in a ubiquitous manner.
Keywords: Therefore, it can be deployed in different domains such as smart home, health, city, retail, logistics, indus-
Internet of things tries and farming. This has brought a new dimension to connect with objects. There are many issues asso-
Computer networks ciated with IoTs such as fading, energy consumption, data security, network security, etc. The ultimate
Network security
aim of this assessment is to show the different kinds of routing methods to solve the problem of network
Routing
Attacks
routing attacks in IoTs. This paper categorizes the attacks in terms of sinkhole, black hole and wormhole
attacks in tabular format.
Ó 2021 Elsevier Ltd. All rights reserved.
Selection and peer-review under responsibility of the scientific committee of the International Confer-
ence on Nanoelectronics, Nanophotonics, Nanomaterials, Nanobioscience & Nanotechnology.
2. Characteristics of IoTs
⇑ Corresponding author.
E-mail address: shrikantmalicse@gmail.com (S.D. Mali). The characteristics of IoTs are described as follows:
https://doi.org/10.1016/j.matpr.2021.07.092
2214-7853/Ó 2021 Elsevier Ltd. All rights reserved.
Selection and peer-review under responsibility of the scientific committee of the International Conference on Nanoelectronics, Nanophotonics, Nanomaterials,
Nanobioscience & Nanotechnology.
Please cite this article as: S.D. Mali and K. Govinda, A study on network routing attacks in IoT, Materials Today: Proceedings, https://doi.org/10.1016/j.
matpr.2021.07.092
S.D. Mali and K. Govinda Materials Today: Proceedings xxx (xxxx) xxx
Ambient Intelligence: IoTs contain a mix of algorithms and metric, which is defined in accordance with the DODAG’s applica-
computations that allow devices to function intelligently. Ambi- tion requirements. Note that the goal feature of each network can
ent intelligence in IoTs improves the items’ capabilities, allow- differ, and it may use metrics such as hop distance or physical dis-
ing them to react intelligently to a particular situation and tance. The goal function can also take into account the desirability
support specific tasks. of a single neighbouring node being chosen as a parent.
Dynamic Nature & Self-Configuring: IoTs devices have the RPL generates a routing topology in the form of a DODAG
potential to adopt dynamically with the changing context. The (Distribution-Oriented Directed Acyclic Graph) [8]. There are three
first activity is to gather data and dynamically adopt the messages in all. DIO, DAO, and DIS are their names. The DAG Infor-
changes that happen around the devices. The devices have mation Object (DIO) contains data that allows a node to obtain an
self-configuring capacity and thus allow an outsized number RPL Instance, learn its configuration parameters, and select DODAG
of devices to figure together. parents. Destination Advertisement Object (DAO) – this object is
Heterogeneity: IoT structures are heterogeneous, meaning they responsible for propagating destination information upwards
use different hardware proposals and systems. Via various net- along the DODAG, as seen in Fig. 1. Solicit a DODAG Information
works, they can communicate with other devices or service Object from an RPL node using DAG Information Solicitation
platforms. (DIS). The basis node broadcasts DIOs at first. Nodes listen for DIOs
Unique Identity: Devices will be identified with unique IP and use that information to find a replacement DODAG and keep it
address or an Uniform Resource Identifier (URI) running. Node chooses parents with the lowest path cost to the
Enormous scale: The number of devices that need to be han- basis, based on the information. RPL determines downward routes
dled and converse with one another would be at least, which using a DAO post. A node can send a DIS message to an RPL node to
is an order of magnitude greater than the number of devices request a DIO, or a node can use DIS to look for DODAGs in its
connected to the internet. vicinity.
Things-related services: Providing thing-related resources
while staying within the constraints of things, such as isolation
and permanence between physical and virtual things.
3.3. Loading protocol
3. Routing protocols for IoTs
Effortless HIPERCOM, EDF, ERDF, Hitachi, and Fujitsu collabo-
3.1. RPL protocol rated on the On-demand Ad-hoc Distance Vector Routing – Next
Generation (LOADng) reactive routing protocol. It’s a simplified
RPL is intended to be LLN’s IPv6 routing procedure. The IETF’s on-demand reactive routing protocol derived from AODV that’s
ROLL working group has published RPL as an RFC. The aim of RPL designed for IEEE 802.15.4 devices in aIPv6 powered LLNs. In
is to concentrate on networks with thousands of nodes and limited 6LoWPan, its behaviour is based on multi-hop routing between
resources. Central gateway nodes control the network. RPL distin- devices in order to evaluate and maintain on-demand routes.
guishes between multipoint-to-point (M2P), point-to-multipoint LOADng is based on the LOAD protocol [9]. The LOAD algorithm
(P2M), and point-to-point (P2P) traffic (P2P). RPL is capable of deal- is ideal for LLN because of its simplicity and low memory capacity
ing with a wide range of traffic [6]. It’s well-suited to M2P and pro- requirements. The aim of LOADing, a simple routing protocol for
vides adequate P2M support. However, it only has basic P2P sensor and IoT networks, is to obtain bi-directional paths. RREQ,
functionality. RPL aspires to be a flexible protocol that can include RREP, RREP–ACK, and RERR messages are produced and processed
a variety of WSN application base mechanisms. Various RPL exten- by each LOADing Router [10]. Routes are defined only if data needs
sions are available to meet a variety of IoT framework to be sent in a reactive protocol. Routes are kept up to date as long
specifications. as there is traffic (active data packets) on them.
RPL may be a pragmatic distance-vector routing protocol. It A source node tries to launch a packet of information to the
builds its routes at regular intervals. Multiple RPL Instances can intention. If there is no active path to the intention, it starts the
be run on the same physical network. As a result, network nodes route discovery process. This source node then generates and
are permitted to be a part of only one RPL instance. From a root broadcasts an RREQ packet across the network. The neighbouring
node to a Destination-Oriented Directed Acyclic Graph, each nodes that receive such RREQ are processed on their reverse route
Instance constructs a tree-like routing structure (DODAG). back to the RREQ originator during this step. After receiving the
RREQ, the intention sends a unicast RREP packet to the RREQ orig-
3.2. Topology formation inator to decide the forward route. The route is modified in the
Routing table [11] when the originator of the RREQ receives the
The development of an RPL topology begins with the designa- correspondent RREP.
tion of a special node as the basis node for one Instance. The net-
work’s configuration parameters are stored in a DODAG
Information Object (DIO), which is then used to disseminate data
across the network. A DIO can be configured in a variety of ways 3.4. Topology formation
to meet the needs of the application. However, RPL Instance ID,
which may be a unique identifier of RPL Instance during a network, The intermediate nodes are implicitly prohibited to respond to
is required information during a DIO. DODAG ID is a unique iden- RREQ, even if it has an active path towards the destination in the
tifier for a DODAG in an RPL Instance. The DODAG version number route discovery phase. Compared to other protocols, LOADng
is used to identify the DODAG. The rank of a node in the DODAG reduced the control message size. When a forward route towards
defines the node’s logical distance from the DODAG’s base node [7]. destination is identified, the intermediate nodes do not maintain
Each node must choose parent nodes from its neighbours when a routing table as maintained in AODV. When data packet that for-
forming the DODAG, with the caveat that the node’s measured warding to the next hop towards destination fails, a Route ERRor
rank must be higher than the rank of all its parents. The creation (RERR) packet is sent only to the destination of the RREP, whereas
of loops is prevented by this process. The rank of a node is deter- it was multicasting to all the neighboring nodes in AODV [12] as
mined in order to support the target Function (OF) and its related depicted in Fig. 2.
2
S.D. Mali and K. Govinda Materials Today: Proceedings xxx (xxxx) xxx
3
S.D. Mali and K. Govinda Materials Today: Proceedings xxx (xxxx) xxx
Table 1
Classification of sink, worm and blackhole attacks.
Sr. Paper Title Author (s) Objective(s) of the Protocol(s)/ Metric(s)/Parameter(s) Used Result(s)
No. Work Algorithm(s)/
Technique(s)
14 Supporting Secure Routing on Christian To Identify and Watchdog, Detection Rate, Number of False Reduces in Delay and
6LoWPAN for IoT et al., Mitigate Sinkhole Reputation and Trust Positives and False Negatives are Increases in Security
Attack Strategies identified
15 SVELTE: Real-time intrusion Shahid et al., To see sinkhole attacks RPL and False Alarms Energy and Memory capacity Security attack is
detection and selective enhanced
forwarding
16 IDS for Detecting Attacks on Anhtuan Le To detect the sinkhole Object and True and False Positive Rate High Accuracy and
RPL et al., attack and rank attack Information Scalability
Solicitation
17 Avoiding Loop in the RPL Stephen To compute the rank RPL, DIO and DODAG Packet Delivery Ratio and Packet Improves in PDR
DODAG based on RIA et al., of attacks Delay Reduction in False
Positive Rate
18 RPL-connected 6LoWPAN Dharmini To identify intrusions RPL Expected Transmissions Improves in Security
Networks Shreenivas
et al.,
19 Wormhole Attack Detection Pavan et al., To identify the RPL Detection rate, energy, packet and High energy efficient.
wormhole attack memory.
20 Visual-Assisted Wormhole Niki et al., To detect the eye sim MDS VOW Color, shape and size Detects multiple
Attack Detection accuracy wormhole attacks.
21 Detecting and monitoring Nilima et al., Detecting and Vis IoT Shapes, sizes, colors Trusted monitoring and
monitoring finding the security
The malicious nodes threat
22 Trust based mechanism for Ruchi Mehta To detect warm hole RPL Energy, throughput packet loss Performed metrics
Wormhole Attacks attack trust based throughput and packet
loss rate
23 Machine Learning Approach Prachi To Detect Wormhole K-means and Detection Rate Eliminates False
to Detect Wormhole Attacks Attacks Decision Tree based Positives
Supervised
24 Wormhole attack detection Sneha et al., To detect the IOT Attacker Detection Neighbor Validation and Distance Detects Malicious
attack. And worm hole and Topology Calculation Nodes
attack Construction
25 Wormhole Attack prevention Faraz et al., To prevent from Merkle Tree based Throughput, Jitter Throughput is
mechanism for RPL Worm hole attack Approach improved
Decreases in delay
26 Implementation of Wormhole Chandra To Detect Worm Hole 6LOWPAN PDR and E-to-E Delay Increases in PDR and
Attack on RPL Protocol in IoT et al., Attack End-to-End Delay
27 Blackhole Attacks Using a David To detect Blackhole RPL Trust based Throughput and Packet loss Avoids incorrect control
Trust-based Mechanism Airehrour attack information
et al., Improves in security
28 Fingerprint Authentication Pooja To prevent from Finger Print Throughput, PDR, Delay and Energy Improves in
and Genetic Algorithm Chandel blackhole attack Authentication and Throughput and Packet
Optimization GA Delivery Ratio
Decreases in Delay and
Energy Consumption
29 A Root-based Defense Jun Jiang To detect blackhole RPL Energy and Throughput Improves in
Mechanism Against RPL et al., attack Throughput
Decreases in Energy
Consumption
30 Proactive Alleviation Rajesh Babu To handle blackhole Proactive alleviation Delay and PDR Increases in PDR and
Procedure to save from blck et al., attack procedure Decreases in Delay
hole
31 Solution against Black Hole Avijit et al., To detect and correct Cryptographic hashes Neighborhood watch and energy Increases in accuracy
and Selective Forwarding blackhole attack and threshold Enhances in security
Attacks and integrity
32 Mitigation of black hole Firoz et al., To mitigate from Local and global Packet Delivery Ratio Reduces Packet Loss
attacks blackhole attack verification process Increases in reliability
up of three layers and was first implemented during the early Network Layer
stages of science. As shown in Fig. 3, there are three layers: sensing
The network layer is at the heart of the IoT. It communicates
layer, network layer, and device layer.
data from the sensor layer to the appliance layer. Information is
transmitted from the sensing layer using 802.15.4 standards. The
Sensing Layer
site, on the other hand, uses the IPv6 protocol to receive data.
The 6LoWPAN working party of the IETF was formed in 2004 to
It’s possible that the sensing layer is a physical layer. This layer
design an adjustment layer for IPv6. In 2007, the comprehensive
is made up of elegant entities that have sensors built in. The sensor
specifications were released (RFC 4919). The 6LoWPAN adaptation
allows for the collection and processing of real-time data by con-
layer, which adds a selected layer and Ipv6 header firmness before
necting the physical and digital worlds. The perception/sensor
forwarding to a standard Ipv6 destination, is the main difference.
layer’s goal is to identify anything in the IoTs system. This layer
This layer allows an end-to-end IP network for a wide variety of
collects data from each object. RFID tags, sensors, cameras, and
functions by extending IPv6 into the 6LoWPAN domain. At the net-
other devices are included.
4
S.D. Mali and K. Govinda Materials Today: Proceedings xxx (xxxx) xxx
work layer, there are two routing processes that take place. Mesh this study, IoTs would be extremely useful in achieving next-
under and Route over, for example. generation networks. Developing IoT procedures and purposes is
a difficult assignment due to resource constraints such as protec-
Application Layer tion, bandwidth, and energy consumption, among others. This con-
fronts variables, properties, and connected works of IoTs
The aim of the application layer is to bring the IoT’s social needs mentioned above will provide a new way for investigators to shape
and industrial technology together. This layer is in charge of pro- enlargement in this field.
viding the user with application-specific services.
5
S.D. Mali and K. Govinda Materials Today: Proceedings xxx (xxxx) xxx
[17] R. Stephan, L. Arokiyam, RIAIDRPL: Rank Increased Attack (RIA) Identification [27] David Airehrour, Sayan kumar ray, Securing RPL Routing Protocol from
Algorithm for Avoiding Loop in the RPL DODAG, Int. J. Pure Appl. Math 1203– Blackhole Attacks Using a Trust-based Mechanism, International
1209. Telecommunication Networks and Applications Conference (2016) 115–120.
[18] Dharmini shreenivas, Shahid Raza, Thiemo voigt, Intrusion Detection in the [28] Pooja Chandel, Rakesh kumar, IoT for the Prevention of Black Hole Using
RPL-connected 6LoWPAN Networks, pp. 31–38. Fingerprint Authentication and Genetic Algorithm Optimization, pp.17–26.
[19] Pavan pongle, gurunath chavan, Real Time Intrusion and Wormhole Attack [29] Jun Jiang, Yuhong Liu, Behnam Dezfouli, A Root-based Defense Mechanism
Detection in IoT, Int. J. Comput. Applications 121(9) (2015) 1–9. Against RPL Blackhole Attacks in IoT Networks, pp.1194–1197.
[20] Niki tsitstiroudi, panagioties sarigiannidis, Eirini karapistoli, EyeSim: A Mobile [30] M. Rajesh Babu, S. Moses Dian, Siva Chelladurai, Mathiyalagan Palaniappan,
Application for Visual-Assisted Wormhole Attack Detection in IoT-enabled Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version,
WSNs, 9th Wireless and Mobile Networking Conference 2016, pp. 1–7. Sci. World J. 1–11.
[21] Nilima Nikam, Poorna R. Pimpale, Pranali Pawar, Anita Shirture, Detecting and [31] Avijit Mathur, Thomas Newe, Muzaffar Rao, Defense against Black Hole and
Monitoring Wormhole in IoT enabled WSNs Using EyeSim, Int. J. Eng. Techn. Selective Forwarding Attacks for Medical WSNs in the IoT, pp. 1–25.
Res. 7(6) (2017) 15–17. [32] Firoz Ahmed, Young-Bae Ko, Mitigation of black hole attacks in Routing
[22] Ruchi Mehta, M.M. Parmar, Trust, based mechanism for Securing IoT Routing Protocol for Low Power and Lossy Networks, 5143–5154.
Protocol RPL against Wormhole & Grayhole Attacks, IEEE (2018) 1–6.
[23] Prachi Shukla, ML-IDS: A Machine Learning Approach to Detect Wormhole
Attacks in IoT‘‘ IEEE, Intell. Syst. Conf. (2017) 234–240.
[24] Sneha Deshmukh Bhosale, S.S. Sonavane, Wormhole attack detection in
Further Reading
internet of things, Int. J. Eng. Technol. 749–751.
[25] V. Chandra Sekhar Reddy, K. Ramesh Reddy, Implementation of Wormhole [5] Luigi Atzori, Antonio Iera, Giacomo Morabito, The IoT: survey, Comput. Netw.
Attack on RPL Protocol in IoT, Int. J. Comput. Sci. Mobile Applications 6 (7) 54 (15) (2010) 2787–2805.
(2018) 63–77. [13] Sethi Pallavi, Smruti R. Sarangi, IoT: architectures, protocols and applications,
[26] Faraz Idris Khan, Taeshik Shon, Taekkyeun Lee, Kihyung Kim, Wormhole J. Electr. Comput. Eng. (2017), https://doi.org/10.1155/2017/9324035.
Attack prevention mechanism for RPL based LLN network, IEEE, pp. 149–154.