Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

An Implementation and Evaluation of the Security Features of RPL

  • Conference paper
  • First Online:
Ad-hoc, Mobile, and Wireless Networks (ADHOC-NOW 2017)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 10517))

Included in the following conference series:

Abstract

Wireless Sensor and Actuator Networks (WSANs) will represent a key building block for the future Internet of Things, as a cheap and easily-deployable technology to connect smart devices on a large scale. In WSAN implementation, the Routing Protocol for Low-Power and Lossy Networks (RPL) has a crucial role as the standard IPv6-based routing protocol. The RPL specifications define a basic set of security features based on cryptography. Without these features, RPL would be vulnerable to simple yet disruptive routing attacks based on forgery of routing control messages. However, the impact of these features on the performances of the WSAN has not been investigated yet. The contribution of this paper is twofold: an implementation of the RPL security features for the Contiki operating system, which is, at the best of authors’ knowledge, the first available, and an evaluation of their impact on the WSAN performances by means of simulations. We show that the protection against eavesdropping and forgery attacks has a modest impact on the performances, whereas the protection against replay attacks has a more considerable impact, especially on the network formation time which increases noticeably.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://github.com/arenantonio92/contiki.

  2. 2.

    Zolertia Z1 website: http://zolertia.io/z1.

References

  1. Airehrour, D., Gutierrez, J., Ray, S.K.: Securing RPL routing protocol from blackhole attacks using a trust-based mechanism. In: 26th International Telecommunication Networks and Applications Conference, pp. 115–120 (2016)

    Google Scholar 

  2. Dunkels, A., Eriksson, J., Finne, N., Tsiftes, N.: Powertrace: network-level power profiling for low-power wireless networks. Technical Report, Swedish Institute of Computer Science (2011)

    Google Scholar 

  3. Dunkels, A., Gronvall, B., Voigt, T.: Contiki—a lightweight and flexible operating system for tiny networked sensors. In: 29th Annual IEEE International Conference on Local Computer Networks, pp. 455–462 (2004)

    Google Scholar 

  4. Dvir, A., Holczer, T., Buttyan, L.: VeRA—version number and rank authentication in RPL. In: IEEE 8th International Conference on Mobile Ad-Hoc and Sensor Systems, pp. 709–714 (2011)

    Google Scholar 

  5. Gaddour, O., Koubâa, A.: RPL in a nutshell: a survey. Comput. Netw. 56(14), 3163–3178 (2012)

    Article  Google Scholar 

  6. Iuchi, K., Matsunaga, T., Toyoda, K., Sasase, I.: Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network. In: 21st Asia-Pacific Conference on Communications, pp. 299–303 (2015)

    Google Scholar 

  7. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1(2), 293–315 (2003)

    Article  Google Scholar 

  8. Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., Chai, M.: The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sens. J. 13(10), 3685–3692 (2013)

    Article  Google Scholar 

  9. Levis, P., Clausen, T., Hui, J., Gnawali, O., Ko, J.: The Trickle algorithm. RFC 6206, RFC Editor (2011)

    Google Scholar 

  10. Mayzaud, A., Badonnel, R., Chrisment, I.: A taxonomy of attacks in RPL-based Internet of Things. Int. J. Netw. Secur. 18(3), 459–473 (2016)

    Google Scholar 

  11. Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: Cross-level sensor network simulation with COOJA. In: 31st IEEE Conference on Local Computer Networks, pp. 641–648 (2006)

    Google Scholar 

  12. Perrey, H., Landsmann, M., Ugus, O., Wählisch, M., Schmidt, T.: TRAIL: topology authentication in RPL. In: International Conference on Embedded Wireless Systems and Networks, pp. 59–64 (2016)

    Google Scholar 

  13. Tsiftes, N., Eriksson, J., Dunkels, A.: Low-power wireless IPv6 routing with ContikiRPL. In: 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, pp. 406–407 (2010)

    Google Scholar 

  14. Weekly, K., Pister, K.: Evaluating sinkhole defense techniques in RPL networks. In: IEEE 20th International Conference on Network Protocols, pp. 1–6 (2012)

    Google Scholar 

  15. Whiting, D., Housley, R., Ferguson, N.: Counter with CBC-MAC (CCM). RFC 3610, RFC Editor (2003)

    Google Scholar 

  16. Winter, T.: RPL: IPv6 routing protocol for low-power and Lossy Networks. RFC 6550, RFC Editor (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pericle Perazzo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Perazzo, P., Vallati, C., Arena, A., Anastasi, G., Dini, G. (2017). An Implementation and Evaluation of the Security Features of RPL. In: Puliafito, A., Bruneo, D., Distefano, S., Longo, F. (eds) Ad-hoc, Mobile, and Wireless Networks. ADHOC-NOW 2017. Lecture Notes in Computer Science(), vol 10517. Springer, Cham. https://doi.org/10.1007/978-3-319-67910-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67910-5_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67909-9

  • Online ISBN: 978-3-319-67910-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics