Implementing and Evaluating A New Silent Rank Atta
Implementing and Evaluating A New Silent Rank Atta
454-462
sciendo
PAPERS__________________________________________________________________________________________________________________
IoT networks are witnessing a rapid growth in various domains of our daily life, offering more attractive features in terms of
measurement accuracy, easy implementation and affordable deployment costs. This outstanding boom is not undoubtedly far
away from different challenging issues that impede the network efficiency and quality. The security concern remains one among
the prominent issues that affect both the edge and the core IoT network where risks increase in conjunction with the network
expansion. RPL is the well-known routing protocol for the edge part of the IoT network, intended to meet the requirements of
the constrained IoT devices. Despite its various advantages, RPL remains suffering from various security attacks targeting the
topology, the traffic, and the nodes resources. Our work presents a new silent decreased rank attack against RPL-Contiki, as
well as a lightweight countermeasure. The obtained results on a random studied topology show that almost half the existing
nodes in the topology were attracted by the planted malicious node, through its falsified low rank. Moreover, an increase of
12.5% in the control overhead and an increase of 15% in the total consumed energy are recorded compared to the attack-free
topology. On the other hand, the attack did not heavily affect the PDR, but the latency showed an increase of 45% compared
to the attack free case. This damaging effect makes this modified rank attack a serious threat to IoT RPL based networks.
system [5, 6]. Moreover, the upsurge number of the it includes signature rules to detect any malicious
connected devices abroad a large spectrum of areas leads behavior in the network. In another work, [19] proposes
IoT networks to face various challenges in different a secured version of the basic RPL protocol named
scales of the network (edge, cloud, fog, etc) [7, 8]. SRPL-RP, where a timestamp and a threshold are
Statistics in [9] reveal a gigantic evolution in the IoT included to detect the legitimacy of a DIO sender. Each
market where 7 billion of IoT devices are interconnected node is identified by an ID and the root node ID is
over the world with 400 platforms. This number is encrypted to avoid its imitation, in addition, a moni-
expected to reach 25 billion by 2030. According to [10], toring table is established in conjunction with the
cyberattacks in IoT reached 1 billion in 2021, since the DODAG building process, contains nodes parameters
third of the connected devices are infected, where (ID, Rank) that help the receiving node to detect further
phishing attacks and DDoS are the most dominant. changing of nodes behaviors, each node sets a blacklist
Given this statistics, the security concern is still table to avoid any new rooting rules coming from an
a challenging research topic. intruder.
Our present work focuses on securing the edge part All the proposed solutions in the literature to thwart
of the IoT network, especially the routing stack. As the rank attack have demonstrated improvements in
known, IoT constrained devices are considered as LLNs different studied metrics compared to the basic RPL.
(Low power and Lossy Networks) and run a networking However, it is strongly recommended to develop
protocol named RPL (Routing Protocol for LLNs) lightweight solutions which meet the constrained
described in the IETF RFC 6550 [11]. Despite, the latter properties of the IoT network in terms of power saving,
seems very suitable for saving the intrinsic properties of computational and storage limitations of the constrained
the IoT devices; it suffers from a wide range of devices. Heavy cryptographic solutions are not suitable
vulnerabilities widely discussed and categorized by for the edge network components and rapidly exhaust
researchers. These attacks target both the topology and the network resources leading to reduce its lifetime.
network resources [12, 13].
The effects of rank attacks are: (i) routing loops,
In RPL nodes are organized in a tree topology, where (ii) unoptimized route formation, (iii) decreased packet
the root node (gateway) gains the governing position, delivery ratio, (iv) increased delay and (v) increased
and it is responsible for applying and spreading RPL transmission of DIO messages, lead to more
routing rules over the network. The other IoT nodes are consumption of resources [20-23]. In this paper we
positioned in the network according to their capabilities present and analyze a new special silent decreased rank
expressed by a value called “rank”, which is clearly attack, where an intruder advertises a better fake rank
explained in the following sections. A malicious node value than its parent, without prompting any loops,
can take part of the network and advertises a fake rank making the attack silent and hard to detect. At first, we
value to its neighborhood aiming to attract other nodes clearly describe the harmful defeat caused by this attack
to relay their data through it. This attack has been widely by simulations using Cooja under Contiki 3.0.
discussed by several recent researches, since RPL does Thereafter, we explain our countermeasure approach
not have any countermeasure to deny this harmful action and its better insight allowing detecting this potential
triggered by an intruder. In the literature various attack.
researches have addresses the rank attack, where in [14]
authors presented a study using Friedman test to
compare recent researches related to the proposed 2 RPL protocol and rank value
mitigation solutions against the rank attack. In [15], The core functioning of RPL is defined in the RFC
authors proposed a new objective function named 6550 [11], it consists of a tree-based topology named
EMBOF for Echelon Metric Based Objective Function DODAG (Direct Oriented Destination Acyclic Graph)
which involves an echelon value triggered and as illustrated in Fig. 1.
exchanged between the root and the corresponding
parent node, by which a faked rank value is detected. The root node is responsible for building the topology
Authors in [16] proposed an updated version of the basic and disseminating the routing rules over the entire
RPL protocol named MFO-RPL for Moth-Flame, they network via control messages. The other nodes are
implement a petal algorithm for the parent selection positioned according to their rank value defined by an
process and the rank attack is detected using Moth- objective function. The root node has the lower rank
Flame algorithm to prevent any falsified rank value. value which increases downward the DODAG.
Another work in [17] consists on a security system called RPL defines four control messages, where DIS
SRF-IoT based on an external intrusion detection system (DODAG Information Solicitation) message is sent by
to prevent any illegitimate nodes to intrude the network. a node to request joining the DODAG, it is sent by
In [18], authors proposed an IDS system called a node when no DIO message is received within a time
DETONAR for DETection of rOuting Attacks in RPL, interval (5 s is the default value in RPL Contiki) [24].
456 Mehdi Rouissat et al.: A lightweight countermeasure solution against a new Silent Rank Attack n RPL-Contiki based IoT networks
DIO (DODAG Information Object) message is other harmful behavior such as Blackhole, targeting
responsible to broadcast DODAG parameters, this thereby the network traffic, topology or the nodes
includes the Instance ID, DODAG ID, and Version resources.
Number (VN), which are used for DODAG
identification and topological update tracking [25].
DAO (Destination Advertisement Object) message is 3 Results and discussion
used for building downward routes from the root node. In this section, simulated results and overall analysis
Finally, DAO-Ack, an optional message used to of the obtained results are discussed. At the beginning,
acknowledge a DAO message. we simulated a basic scenario (attack free case), used as
a reference to judge the effect of the attack on the
performance of the network. The studied topology is
shown in Fig. 2, it consists of 1 sink node, 23 fair nodes
and a single malicious node (node "25") placed two hops
from the sink node.
Number of children
Objective function MRHOF 8
6
Attack free
LPRA
4
1400
2
1350
1300 0
0 2 4 6 8 10 12 14 16 18 20
1250 Time (minutes)
Rank
Table 2. Control overhead in the attack free case Table 3. Energy consumption
and in LPRA by the four modes in (mJ)
3
Energy (mj)
1.5
0.5
Fig. 6. Rank values of the malicious node
0
Attack free LPRA and its parents
To give a better understanding of the discussed
Fig. 5. Energy consumption in the attack free case concept, Fig.6 shows the rank values of the malicious
and in LPRA node “node 25” and its parents after 135 seconds of
simulation. The malicious node's parent, node 10, is
The increase in the consumed energy is mainly due advertising a rank of 813 = 768 + 45. If the malicious
to the increase in the TX mode, where it jumped from node advertises a rank value of 768, it will advertise
15.57 J in the attack free case to 16.53 J in the case of a rank value better than its preferred parent, without
LPRA, as table 3 details. engendering any loops, since, as discussed earlier it is
not violating the hop counts.
To implement this special attack, we modified the
RPL “rpl-mrhof.c” file of the malicious node, where the
value of the calculated rank is modified to
𝑅𝑎𝑛𝑘𝑁𝑜𝑑𝑒 = 𝑎𝑏𝑠(𝑏𝑎𝑠𝑒_𝑟𝑎𝑛𝑘 / 256 ) ∗ 256 (3)
Journal of Electrical Engineering, Vol. 74, No. 6, 2023 459
By doing so, a modified rank attack is conducted This successful attack has reflected on the number of the
without triggering any loops in the topology, which forwarded DAO messages by the malicious node. In the
make it silent and hard to detect. attack free case, it forwarded 10 DAO messages, in
LPRA it has forwarded 59 DAO messages, while in
14 BPRA 71 DAO messages have been forwarded by the
malicious node, which again explain the strategic
12
position it gained in the network. The recorded increase
10 in the control messages would impose higher amounts of
resource consumption, particularly in terms of energy
Number of children
8
and links availability.
Attack free
6 LPRA
BPRA
48863.91 50519.33
2.5
could have up to 12 children nodes. Based on these
results, this second modified rank attack is considered as 2
0.5
3.2.1 Impact of BPRA on the control overhead
0
Table 4 summarizes the exchanged control messages Attack free LPRA BPRA
Table 4. Control overhead for the three cases The contribution of the different modes in the total
consumed energy is detailed in table 5. The TX mode is
Sent messages the main contributor, it showed an increase of 25.7%
compared to the attack free case.
Generated Forwarded
DIO DAO DAO Total
Table 5. Energy consumption in the three cases in mJ
Attack
548 284 430 1262
free
LPM CPU TX RX Total
LPRA 564 275 423 1262 Attack
4340.2 4338.5 15572.3 24288.7 48863.9
BPRA 603 326 491 1420 free
LPRA 4336 4478.4 16537.3 24843.5 50519.3
BPRA 4321.8 4945.3 19566.7 27028.5 56186.4
The main factor that leads to this increase is the
forwarded DAO messages. This increase reflects a non-
optimal topology, due to the non-optimally created paths
Based on its strategic position in the topology and its
by the attack, where around half the existing nodes are
new forwarding tasks, the malicious node is the main
direct or indirect children attached to the malicious node.
460 Mehdi Rouissat et al.: A lightweight countermeasure solution against a new Silent Rank Attack n RPL-Contiki based IoT networks
contributor in the total consumed energy. According to Table 7. PDR and latency for the three cases
Fig. 9, the total consumed energy of node 25 has in-
creased compared to the attack free case, by 98% and Latency (s) PDR (%)
118% in the LPRA, and BPRA respectively.
Attack free 0.42 97
4000
Table 7 also shows the recorded latency in the three
Energy (mj)
[17] P. P. Ioulianou, V. G. Vassilakis, and S. F. Shahan- [25] M. Rouissat, M. Belkheir, I. S. Alsukayti, and
dashti, “A Trust-Based Intrusion Detection System A. Mokaddem, “A Lightweight Mitigation Ap-
for RPL Networks: Detecting a Combination of proach against a New Inundation Attack in RPL-
Rank and Blackhole Attacks,” Journal of Cyber- Based IoT Networks,” Applied Sciences, vol. 13,
security and Privacy, vol. 2, no. 1, pp. 124-152, no. 18, p. 10366, Sep. 2023,
Mar. 2022, doi: 10.3390/app131810366.
doi: https://doi.org/10.3390/jcp2010009. [26] P. Thubert, (2012, March). Objective function zero
[18] A. Agiollo, M. Conti, P. Kaliyar, T.-N. Lin, and for the routing protocol for low-power and lossy
L. Pajola, “DETONAR: Detection of Routing networks (RPL). Internet Engineering Task Force.
Attacks in RPL-Based IoT,” IEEE Transactions on Retrieved July 20, 2022.
Network and Service Management, vol. 18, no. 2, http://www. ietf.org/rfc/rfc6552.txt
pp. 1178-1190, Jun. 2021, [27] O. Gnawali, P. Levis, (2012 September), The
doi: https://doi.org/10.1109/tnsm.2021.3075496. minimum rank with hysteresis objective function.
[19] Z. A. Almusaylim, N. Jhanjhi, and A. Alhumam, Internet Engineering Task Force. Retrieved July 20,
“Detection and Mitigation of RPL Rank and 2022. URL http://www.ietf.org/rfc/rfc6719.txt
Version Number Attacks in the Internet of Things: [28] D. Airehrour, J. Gutierrez, and S. K. Ray, “Secure
SRPL-RP,” Sensors, vol. 20, no. 21, p. 5997, Oct. routing for internet of things: A survey,” Journal of
2020, doi: https://doi.org/10.3390/s20215997. Network and Computer Applications, vol. 66, pp.
[20] P. S. Nandhini, S. Kuppuswami, and S. Malliga, 198-213, May 2016,
“Energy efficient thwarting rank attack from RPL doi: https://doi.org/10.1016/j.jnca.2016.03.006.
based IoT networks: A review,” Materials Today: [29] M. Amirinasab Nasab, S. Shamshirband, A. Chro-
Proceedings, May 2021, nopoulos, A. Mosavi, and N. Nabipour, “Energy-
doi: https://doi.org/10.1016/j.matpr.2021.04.167. Efficient Method for Wireless Sensor Networks
[21] A. Mayzaud, R. Badonnel, I, Chrisment, “A taxo- Low-Power Radio Operation in Internet of Things,”
nomy of attacks in RPL-based internet of things”, Electronics, vol. 9, no. 2, p. 320, Feb. 2020,
International journal of network security, 18 (3), doi: https://doi.org/10.3390/electronics9020320.
459-473, 2016, DOI: 10.6633/IJNS.201605 [30] S. S. Solapure and H. H. Kenchannavar, “Design
[22] H. Kumar Saini and M. Poriye, “Threats, Detection and analysis of RPL objective functions using
and Mitigation of Rank Attack: A Survey,” SSRN variant routing metrics for IoT applications,”
Electronic Journal, 2021, Wireless Networks, vol. 26, no. 6, pp. 4637-4656,
doi: https://doi.org/10.2139/ssrn.3884409. May 2020, doi: https://doi.org/10.1007/s11276-
[23] A. Le, J. Loo, A. Lasebae, A. Vinel, Y. Chen, and 020-02348-6.
M. Chai, “The Impact of Rank Attack on Network [31] R. Stephen, L. Arockiam, (2018) “RIAIDRPL:
Topology of Routing Protocol for Low-Power and Rank Increased Attacks (RIA) Identification
Lossy Networks,” IEEE Sensors Journal, vol. 13, algorithm for avoiding loop in the RPL DODAg”,
no. 10, pp. 3685-3692, Oct. 2013, International Journal of Pure and Applied
doi: https://doi.org/10.1109/jsen.2013.2266399. Mathematics, 119 (16), 1203-1210, 2018.
[24] M. Rouissat, M. Belkheir, and H. S. A. Belkhira,
“A potential flooding version number attack against Received 23 October 2023
RPL based IOT networks,” Journal of Electrical ________________________________
Engineering, vol. 73, no. 4, pp. 267-275, Aug.
2022, doi: https://doi.org/10.2478/jee-2022-0035.