Abstract
Wireless Sensor and Actuator Networks (WSANs) will represent a key building block for the future Internet of Things, as a cheap and easily-deployable technology to connect smart devices on a large scale. In WSAN implementation, the Routing Protocol for Low-Power and Lossy Networks (RPL) has a crucial role as the standard IPv6-based routing protocol. The RPL specifications define a basic set of security features based on cryptography. Without these features, RPL would be vulnerable to simple yet disruptive routing attacks based on forgery of routing control messages. However, the impact of these features on the performances of the WSAN has not been investigated yet. The contribution of this paper is twofold: an implementation of the RPL security features for the Contiki operating system, which is, at the best of authors’ knowledge, the first available, and an evaluation of their impact on the WSAN performances by means of simulations. We show that the protection against eavesdropping and forgery attacks has a modest impact on the performances, whereas the protection against replay attacks has a more considerable impact, especially on the network formation time which increases noticeably.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
Zolertia Z1 website: http://zolertia.io/z1.
References
Airehrour, D., Gutierrez, J., Ray, S.K.: Securing RPL routing protocol from blackhole attacks using a trust-based mechanism. In: 26th International Telecommunication Networks and Applications Conference, pp. 115–120 (2016)
Dunkels, A., Eriksson, J., Finne, N., Tsiftes, N.: Powertrace: network-level power profiling for low-power wireless networks. Technical Report, Swedish Institute of Computer Science (2011)
Dunkels, A., Gronvall, B., Voigt, T.: Contiki—a lightweight and flexible operating system for tiny networked sensors. In: 29th Annual IEEE International Conference on Local Computer Networks, pp. 455–462 (2004)
Dvir, A., Holczer, T., Buttyan, L.: VeRA—version number and rank authentication in RPL. In: IEEE 8th International Conference on Mobile Ad-Hoc and Sensor Systems, pp. 709–714 (2011)
Gaddour, O., Koubâa, A.: RPL in a nutshell: a survey. Comput. Netw. 56(14), 3163–3178 (2012)
Iuchi, K., Matsunaga, T., Toyoda, K., Sasase, I.: Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network. In: 21st Asia-Pacific Conference on Communications, pp. 299–303 (2015)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1(2), 293–315 (2003)
Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., Chai, M.: The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sens. J. 13(10), 3685–3692 (2013)
Levis, P., Clausen, T., Hui, J., Gnawali, O., Ko, J.: The Trickle algorithm. RFC 6206, RFC Editor (2011)
Mayzaud, A., Badonnel, R., Chrisment, I.: A taxonomy of attacks in RPL-based Internet of Things. Int. J. Netw. Secur. 18(3), 459–473 (2016)
Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: Cross-level sensor network simulation with COOJA. In: 31st IEEE Conference on Local Computer Networks, pp. 641–648 (2006)
Perrey, H., Landsmann, M., Ugus, O., Wählisch, M., Schmidt, T.: TRAIL: topology authentication in RPL. In: International Conference on Embedded Wireless Systems and Networks, pp. 59–64 (2016)
Tsiftes, N., Eriksson, J., Dunkels, A.: Low-power wireless IPv6 routing with ContikiRPL. In: 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, pp. 406–407 (2010)
Weekly, K., Pister, K.: Evaluating sinkhole defense techniques in RPL networks. In: IEEE 20th International Conference on Network Protocols, pp. 1–6 (2012)
Whiting, D., Housley, R., Ferguson, N.: Counter with CBC-MAC (CCM). RFC 3610, RFC Editor (2003)
Winter, T.: RPL: IPv6 routing protocol for low-power and Lossy Networks. RFC 6550, RFC Editor (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Perazzo, P., Vallati, C., Arena, A., Anastasi, G., Dini, G. (2017). An Implementation and Evaluation of the Security Features of RPL. In: Puliafito, A., Bruneo, D., Distefano, S., Longo, F. (eds) Ad-hoc, Mobile, and Wireless Networks. ADHOC-NOW 2017. Lecture Notes in Computer Science(), vol 10517. Springer, Cham. https://doi.org/10.1007/978-3-319-67910-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-67910-5_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67909-9
Online ISBN: 978-3-319-67910-5
eBook Packages: Computer ScienceComputer Science (R0)