Real Time Intrusion and Wormhole Attack Detection in Internet of Things
Real Time Intrusion and Wormhole Attack Detection in Internet of Things
ABSTRACT receiving the DIO message selects the parent to sender by reply-
ing DAO (Destination Advertisement Object) message asking can
There are currently more objects connected to the Internet than I join you? Parent node gives the permission to join by sending
people in the world. This gap will continue to grow, as more ob- DIO ACK message as yes you can join me. The rank value calcu-
jects gain the ability to directly interface with the Internet. Pro- lated with respect to the parents rank value and other parameters.
viding security in IoT is challenging as the devices are resource The rank value may be depend on the distance from the root node,
constrained, the communication links are lossy, and the devices use energy of link etc. The network owner can decide the rank value
a set of novel IoT technologies such as RPL and 6LoWPAN. Due calculation parameters. If new node want to join the network it first
to this it is easy to attack in IoT network. The proposed system ask is there any DODAG here? By sending DIS (DODAG Info so-
is a novel intrusion detection system for the IoT, which is capable licitation) message. The nodes continue to broadcast the DIO mes-
of detecting Wormhole attack and attacker. The proposed methods sage and form the tree topology. Fig. 1 shows the comparison of
uses the location information of node and neighbor information to protocols used at traditional IP network and IoT.
identify the Wormhole attack and received signal strength to iden-
tify attacker nodes. Design of such system will help in securing the
IoT network and may prevents such attacks. This method is very
energy efficient and only takes fixed number of UDP packets for
attack detection, hence it is beneficial for resource constrained en-
vironment.
Keywords
Intrusion Detection, Internet of Things, RPL, Wormhole,
Packet Relay, Encapsulation, RSSI
1. INTRODUCTION
Internet of Things (IoT) is a fast-growing innovation that
will greatly change the way humans live. It can be thought of as
the next big step in Internet technology. The changing operating
environment associated with the Internet of Things represents
considerable impact to the attack surface and threat environment of
the Internet and Internet-connected systems. IoT is heterogeneous Fig. 1. Protocols used at traditional IP network and IoT
system consisting of various types of sensors nodes or devices
with different kind of technology at each layer. However, due to
the limited address space of IPv4, objects in the IoT uses IPv6 to
accommodate space in Internet. Objects in the IoT can be devices The rest of the paper is organized as follows: Section II discuss
with sensory capabilities, smart metering, health care sensor etc. the related work in Wormhole attack detection techniques and IDS
systems designed for IoT. Section III gives discussion on architec-
RPL (Routing Protocol for low power and Lossy network) [1] ture of system, modules and algorithm used for detecting attack.
is routing protocol used at the network layer in IoT. RPL topol- In section IV we have discussed the algorithms used to detect the
ogy contains one root/sink node directly connected to Internet using attack and design of wormhole attacker node. Section V is on dis-
6BR (IPv6 Border Router). RPL topology forms the DODAG (Des- cussion of how the attacks are detected using proposed system with
tination Oriented Directed Acyclic Graph) tree, which contain only example. Section VI on evaluation of system using various param-
1 root. Root node starts the formation of the topology by broad- eter. Section VII gives the future work and extension for proposed
casting the DIO (DODAG Information Object) messages. Nodes system. Section VIII concludes the work done.
1
International Journal of Computer Applications (0975 - 8887)
Volume 121 - No. 9, July 2015
2
International Journal of Computer Applications (0975 - 8887)
Volume 121 - No. 9, July 2015
records the RSSI value form other victim colleague and send it to
6BR. The received RSSI values are from the the two victim nodes
and other nodes in the range of attacker node. The duplicate RSSI
received packets from same node are discarded by comparing that
node already sent the RSSI value.
3.2.4 Attacker detection. This module process on received RSSI
value to find the attacker node. Using RSSI to distance d it states
the nodes in that range d, and list the nodes with probability of
having attacker nodes.
3
International Journal of Computer Applications (0975 - 8887)
Volume 121 - No. 9, July 2015
3.3.3 Monitoring RSSI. When node receives the victim packet ei- (c) If other victim neighbor node is 6BR the
ther from the root node or from broadcasting, it initiate the moni- Initiate the Monitoring algorithm
toring process. Node receiving victim packet if it found its own
ID at destination place (second field), and other victim colleague (3) If victim packet is sent then
in third field. it prepare victim broadcast packet containing desti- Wait for time until all RSSI values to be received and until then
nation field as other victim colleague ID and at third field its own no other new attack processing
id (interchange the two IDs). This two node records the each oth- (4) If RSSI value from node Ni is received the drop all further
ers RSSI value receiving from broadcast victim packets. and other RSSI val packets from node Ni as duplicate packets
node records the RSSI value as mentioned in algorithm monitor- (5) If RSSI wait timer expires and at least one RSSI value received
ing algorithm. The two victim node broadcast the N victim packets then
to locate the attacker node.
(a) Find the RSSI to distance d for all received RSSI values
3.3.4 Send RSSI. After broadcasting the n victim packets the (b) Find the all nodes which are in the range of distance d
recorded RSSI value must reach to the sink node for attacker node considering error in measurments of RSSI values. these
detection, so due to unreliable UDP protocol we are sending the nodes are suspect nodes.
RSSI packets repeatedly by unicast, broadcast and through the de- (c) Keep count with all such suspect nodes, for how many
fault route. The each node waits for time until all node finishes time it is suspected as attacker node.
victim packet transmission, and send RSSI packets by taking pause (d) The suspect node having high probability is consider as
of fixed interval between each successive RSSI packet send. The attacker node.
packet structure is shown in Fig. 6. Here first field is code 5 for
RSSI packet, second the RSSI value recored by node and third is to 4.1.3 Algorithm for monitoring node
which node’s it had recorded. and followed by three RSSI values.
(1) When node receives victim packet contains its own ID then
(a) It start monitoring for other victim colleague node (Third
field in victim packet)
(b) Start transmission of n victim packets to other victim col-
Fig. 6. Sending RSSI value packet structure league
(c) Similarly other victim colleague node does same on re-
ceiving such victim packet
4. METHODOLOGY AND ALGORITHMS (2) When node receives victim packet that does not contains its
own ID then
4.1 Algorithms
(a) If both victim nodes are original neighbors of node then it
4.1.1 Algorithm for detection of wormhole attack on sensor nodes does not monitor for any node
(1) For every node N do (b) If both victims are not original neighbors of node then it
Wait for settlement of the network monitor for unknown node, i.e. It records the RSSI value
of received victim packets
(2) After network initialization, stores the current neighbors as
(c) If one victim is original neighbor of node and other isn’t
original neighbors
then it monitor for victim node which is not its original
(3) For every periodic time do neighbor. means record the RSSI value of the victim pack-
Check whether there is change in neighbors ets that it is receiving form non original neighbor node.
If change in neighbors found then
Send nbr info (neighbor information) to 6BR through broad-
cast and default route 4.2 Attacker Node Creation
(4) If node receives the victim packet then Only Packet relay and encapsulation kind of wormhole attacker
Initiate monitoring algorithm are evaluated in experimentation. Various configurations are there
(5) If node finishes the recording of RSSI value then to construct the attacker node, ex. encapsulation kind of wormhole
Broadcasts and unicast the RSSI value packet to reach to sink can be created at network and mac layer also. Let see how attacker
node multiple times node does malicious activity.
(6) If node receives broadcast nbr info and RSSI value packets 4.2.1 Packet Relay Wormhole Attacker. In this kind of attacker
then node, it relays/transmits the packets which are received on its radio
Send the received packets to the root node through default interface without making any changes in packet. In Fig 7 we can
route see the various layers of Contiki OS. At radio layer for listening the
4.1.2 Algorithm for wormhole detection at the 6BR packets from all node first the radio interface is put in promiscuous
mode, so that it can get the packets which are not for him. In cc2420
(1) Calculate distance between each node configuration by making the register bits of CC2420 MDMCTRL0
(2) If neighbor info received from node Ni then (address decoder) to 0 we can achieve it. Now we can get the pack-
If actual distance between Ni and its neighbor is more than the ets of other node. Next step is relaying the packet, here the all
range of node Ni then packets are relayed including unicast, broadcast, packets belongs
(a) Generate Alert for attack to other PAN. This is done at RDC (Radio duty cycling layer) layer
(b) Send victim packet to nbr info sender node and other vic- only know as sicslowmac in Contiki. We are not letting packets to
tim neighbor node go at upper layer.
4
International Journal of Computer Applications (0975 - 8887)
Volume 121 - No. 9, July 2015
5
International Journal of Computer Applications (0975 - 8887)
Volume 121 - No. 9, July 2015
tributed module, and 6BR runs centralized modules. Topology is 6.3 True Positive Detection Rate
adjusted such that each node should be in the range of at least one
other node, such that tree structure formed and network partition For detection rate we have performed the various number of
should not be there. simulation on 8, 16, 24 node topology. Taking distinct nodes as
attacker. This result is combination of both Packet relay and En-
capsulation kind of wormhole attack. The result for attack detec-
tion in graph 14 is 94%, and of both attacker and attack is 87%.
Only attack detected but not attacker is more found in Encapsula-
tion kind of attack and where there is not sufficient number of nodes
to monitor RSSI values and if victim packet unable to reach to vic-
tim nodes. The nodes at the leaf of tree are mostly not considered
as attacker as, attack by them does not affect the normal operation
of topology, ex. node 19 in 24 node topology is not considered as
attacker and if attack performed by 19 (Packet relay) the no wrong
neighbors can be formed and thus, unable to detect such attacker.
All detection rate is only depend on successful packet delivery.
6
International Journal of Computer Applications (0975 - 8887)
Volume 121 - No. 9, July 2015
7
International Journal of Computer Applications (0975 - 8887)
Volume 121 - No. 9, July 2015
Acknowledgment
I am thankful of my guide G. T. Chavan for his guidance and
constant encouragement throughout the course of this work. Lastly,
I thank almighty, my family and friends for their constant encour-
agement without which this work would not be possible.
9. REFERENCES
Fig. 18. Packet overhead in attack detection
[1] IETF, RPL. “Routing Over Low Power and Lossy Networks.”
[2] Wallgren, Linus, Shahid Raza, and Thiemo Voigt. “Routing
shows the pure overhead of IDS modules in Contiki. This overhead
Attacks and Countermeasures in the RPL-based Internet of
is the difference between Hello world application and IDS, as Hello
Things.” International Journal of Distributed Sensor Networks
world application inside Contiki is the lightest application avail-
2013, 2013.
able. Even though centralized modules are not targeted towards
running on constrained nodes it is still lightweight enough and can [3] Song N, Qian L, Li X, “Wormhole attacks detection in wire-
be used for small networks.The total RAM size in the Tmote sky is less ad hoc networks: a statistical analysis approach”, Paral-
10 KB, hence IDS modules with 2.8 KB additional RAM require- lel and Distributed Processing Symposium, 2005. Proceedings.
ment can easily run in constrained nodes. 19th IEEE International,vol., no., pp. 8 pp., 4-8 April 2005.
[4] H. S. Chiu and K. Lui, “DelPHI: Wormhole Detection Mech-
anism for Ad Hoc Wireless Networks”,In Proceedings of In-
Table 3. Additional ROM and RAM usage by IDS ternational Symposium on Wireless Pervasive Computing, pp.
Node ROM RAM ROM RAM ROM RAM 6-11, 2006.
/Size total total occu- occu- Over- Over-
[5] L. Hu and D. Evans, “Using directional antennas to prevent
(B) pied pied head head
wormhole attacks”, Proc. Symp. Netw. Distrib. Syst. Security,
6BR 1 MB - 1,58,813 64,340 96,962 42,636 2004
Sky Mote 48KB 10KB 43,098 7,454B 24,900 2,886
[6] Dhurandher, Sanjay Kumar, et al., “E2SIW: An Energy Effi-
cient Scheme Immune to Wormhole Attacks in Wireless Ad
Hoc Networks. ”, Advanced Information Networking and Ap-
plications Workshops (WAINA), 2012 26th International Con-
7. FUTURE WORK ference on. IEEE, 2012
The proposed IDS system are very easy to extend. There are [7] Raju, V. Karthik, and K. Vinay Kumar, “A Simple and Efficient
a number of potential attacks against the Internet of Things and it Mechanism to Detect and Avoid Wormhole Attacks In Mobile
is likely that more attacks will be discovered. The location infor- Ad Hoc Networks”, Computing Sciences (ICCS), 2012 Inter-
mation of nodes will also help to mitigate the Sybil and Clone ID national Conference on. IEEE, 2012.
attacks and will enhance its intrusion detection capabilities. RPL [8] Yifeng Zhou , Lamont L , Li Li,“Wormhole attack detection
specific attacks Version Number and Local Repair attack can be based on distance verification and the Use of hypothesis test-
detected by validating DODAG version and ID at 6BR [9]. Worm- ing for wireless ad hoc networks”, Military Communications
hole attack can be combined with the selective forwarding attack Conference, MILCOM IEEE, 2009
e.g. sending either data or control packet through tunnel detecting [9] Pavan Pongle, Gurunath Chavan, “A survey: Attacks on RPL
this could be an extension for proposed system. This system also and 6LoWPAN in IoT ”, International Conference on Perva-
able to detect the neighbor attack [17] only but not evaluated yet. sive Computing (ICPC) IEEE, 2015
Minor changes in system will help to detect the Neighbor attacker [10] Amin, Syed Obaid, et al. “A novel coding scheme to im-
also. plement signature based IDS in IP based Sensor Networks.”
Integrated Network Management-Workshops, 2009. IM’09.
8. CONCLUSION IFIP/IEEE International Symposium on. IEEE, 2009.
Considering the potential applications of the IoT it is impor- [11] Kasinathan, Prabhakaran, et al. “Denial-of-Service detection
tant that 6LoWPAN networks are protected against internal and in 6LoWPAN based internet of things.” Wireless and Mobile
external intrusions. This work concludes that, the proposed novel Computing, Networking and Communications (WiMob), 2013
light weight IDS system is basically designed for resource con- IEEE 9th International Conference on. IEEE, 2013.
strained sensor nodes and able to detect Wormhole attacks of two [12] Le, Anhtuan, et al. “Specification-based IDS for securing
kind packet relay and encapsulation. Mostly centralized modules RPL from topology attacks.” Wireless Days (WD), 2011 IFIP.
are used for doing heavy processing and Light weight modules run IEEE, 2011.
8
International Journal of Computer Applications (0975 - 8887)
Volume 121 - No. 9, July 2015