Rank Attack Using Objective Function in
Rank Attack Using Objective Function in
net/publication/374742953
Rank attack using objective function in RPL for low power and lossy networks
CITATIONS
1 author:
Abdul Rehman
Bahria University
3 PUBLICATIONS 1 CITATION
SEE PROFILE
All content following this page was uploaded by Abdul Rehman on 20 October 2023.
Abdul Rehman Meer Muhammad khan M. Ali Lodhi Faisal Bashir Hussain
Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science
Bahria University Bahria University Bahria University Bahria University
Islamabad, Pakistan Islamabad, Pakistan Islamabad, Pakistan Islamabad, Pakistan
Abdul.mul103@gmail.com Meer.khan78@gmail.com Alilodhi30@gmail.com faisalbashir@bahria.edu.pk
III. RELATED WORKS • Candidate Parent Node (CPN): Any neighbour of a node
Existing rank attack [4] has the objectives of making attacking possessing lesser rank value is termed as CPN. In a
network a node can have number of Candidate Parent
node lucrative to neighbouring nodes for the next hop
Nodes (CPNs) and any CPN can be selected for forwarding
selection. Apart from converging and routing the traffic
data to the sink node in RPL.
through attacking nodes similar attacks [3, 5] are introduced in
• Preferred Parent Node (PPN): It is one of the CPN with
RPL in which the adversary selects suboptimal forwarding lowest rank and best routing metric selected for forwarding
nodes. data to the sink node by a node in RPL network.
To the best of our knowledge the only pure rank attack on • Malicious Node (MN): This node will launch RAOF attack
RPL is introduced in [4]. The attack is similar to sinkhole in the RPL network. The words MN and Attacking Node
attack [8] in ad hoc networks. The work assumes a network (AN) are interchangeably used in this paper.
topology that is created only on the basis of rank metric and
no other routing metric is considered. The attacking node joins
the network and suddenly announces a lower rank value than According to RPL, the rank computation is linked with OF
its neighbouring nodes. As a result, the neighbouring nodes and it must be implemented in a generic method to include
select the attacking node as their preferred parent and they rank of preferred parent, node metrics, link metrics and the
node configuration policies. We consider a simplistic rank
further announce this network change to their child nodes.
calculation as recommended by RPL in RFC [9] based on OF
However, in RPL based networks, it is recommended to use
that uses ETX for path selection. In this case, rank of a node DODAG uses single OF for topology formation and
R(N) is calculated based on the rank of the parent R(P) and is maintenance.
shown in the following equations: Consider, a network topology where an attacking node has a
ܴሺܰሻ ൌ ܴሺܲሻ ݇݊ܽݎ௦ legitimate rank and the minimum rank among its
neighbors is . In this case the attacker will announce a
݇݊ܽݎ௦ ൌ ሺܴ݂ ൈ ܵ ܵݎሻ ൈ ݁ݏܽ݁ݎܿ݊ܫܴ݇݊ܽܪ݊݅ܯ rank value that is less than to launch the attack. Hence in
̴ୟୡ୲୭୰ ሺሻ defines rank factor which is a configurable order to launch the attack the attacker will decrease it rank
factor that is used to multiply the effect of the link properties below and the advertised rank for the attacker can be
in the rank_increase computation. ̴̴ሺሻ is expressed as ൏ . In this case, if the announced rank
computed for that link (e.g., based on ETX) is multiplied by is very low then the neighbors of the attacker will discard this
the Rf. ̴̴ሺሻthat is less than or equal to the rank value. This is because RPL recommends that rank change
configured stretch_of_rank per hop rank increase computing. should be within some limits otherwise sudden change of rank
is a variable that can be distributed in can result in the creation of very unstable network topologies.
the network with a fixed constant [11]. Hence, in RAOF the attacker announces a rank with the
relation ̴ ൏ ܴ ൏ , where ̴ is the rank of
PPN of the attacker. In this way, the rank change announced
by the attacker is not very drastic but is less than most of the
neighboring nodes.
In order to further elevate the intensity of the attack the
routing metric (ETX) announced in the DIO message is
drastically lowered as compared to the minimum observed
among the neighbors. Since routing metric values can change
very dynamically in real networks as compared to rank value
therefore RPL suggests no measures to monitor the change in
routing metric values.
As illustrated in Figure2, the neighboring nodes of the
attacking node 31 will converge towards the node 31 by
selecting it as their new PPN. The solid lines shows original
connectivity before the launching of RAOF attack and the
dotted lines depicts the new connectivity after the launch of
RAOF. Once the attacking node becomes the PPN in the
Figure 2: RAOF launched by node 31 in an RPL network attacking region it can affect the network performance in the
following ways.
V. RAOF ATTACK VI. SIMULATIONS ANALYSIS
In this section, the RAOF attack is explained in length. An
important factor in parent selection along with rank is To measure the impacts of intruders on network Cooja
objective function (OF). If a node receives a valid rank then simulator [12] is used which runs over Contiki OS, malicious
before changing the PPN it must calculate the OF value based nodes placed on different locations and circle around the
on routing metrics. For example, if the routing metric is based malicious nodes indicate transmission range and data reporting
on ETX and the OF is defined to maintain routing path having nodes as shown in Figure 3. Node 1 is the sink/root node in
lowest ETX value then a node will receive both rank and ETX the network. Network parameters used for simulations
for its PPN. analysis as listed in table 1 and nodes characteristics are
In this scenario to successfully launch a RAOF the mirrored according to mote sky sensor nodes [12].
attacking node must corrupt the routing metric announced by
the parent node so that OF of the neighboring nodes favor the Table 1.Network Parameter used in simulation analysis
attacking node. In this work, we have used ETX as basic
Parameter Value
routing metric. Each node calculates ETX for successful Network Layer RPL
transmission from source to destination using the following MAC Layer IEEE 802.15.4
formula [10]. Simulation runtime 600s
Event reporting 500s
Objective Function (OF) mrhf, ETX
ܺܶܧൌ ͳȀݎܦ כ ݂ܦ Number of Sensor nodes 100
Where, ݂ܦis the measured probability that a packet is DIO minimum interval 4 sec
received by the neighbor and ݎܦis the measured probability DIO maximum interval 17.5 min
that the acknowledgment packet is successfully received. To Sending rate 1 packet every 10 sec
Number of source nodes 2-40
use ETX as OF it is included in DAG metric container. A Number of attacking nodes 1-30
TX range 20 m
Interference range 30m packets. The simulation setup is same as shown in Figure 3.
Packet size (excluding header) 50 Bytes All nodes within the event reporting region from R1 to R5 and
sending data at 6 packets/min [3]. During the normal operation
of RPL without any attacking node high throughput is
observed and delivery ratio is above 97%. When the attacking
nodes drop only 10% of the traffic the routing metric ETX
does not change significantly and the source nodes continue to
route data through the attacking node. However, if the
attacking nodes drop more than 20% of the forwarding traffic
the ETX of the source nodes through the attacking nodes
increases and they change their routing path, eliminating
routes through the attacking node.This is visible in Figure 9
Figure 3:Simulation setup for RAOF attack at various that the delivery ratio drops when packet drop ratio is 20 or
places. 30% but then increases source nodes from the event region
change their routing paths.
REFERENCES