A Comprehensive Review of Low-Power Internet of Things Networks under DIO- Suppression Attacks and Countermeasures

Authors

  • Pooja Suhag Department of Electronics and Communication Engineering, University Institute of Engineering and Technology, Maharshi Dayanand University, Rohtak, Haryana, India
  • Akshaya Dhingra Department of Electronics and Communication Engineering, University Institute of Engineering and Technology, Maharshi Dayanand University, Rohtak, Haryana, India
  • Vikas Sindhu Department of Electronics and Communication Engineering, University Institute of Engineering and Technology, Maharshi Dayanand University, Rohtak, Haryana, India
  • Anil Sangwan Department of Electronics and Communication Engineering, University Institute of Engineering and Technology, Maharshi Dayanand University, Rohtak, Haryana, India

Keywords:

classification of attacks, compromise, DIO Suppression, RPL technology

Abstract

The Internet of Things (IoT) is a system of devices connected over the Internet. It is currently being utilized in various applications such as smart agriculture, smart industrial monitoring, smart homes, and smart vehicles, which rely on low-power and lossy networks (LLNs). To ensure the reliability and enhancement of the IoT system, it is essential to investigate the threats against the standardized Routing Protocol for LLNs (RPL) developed by the IETF. This paper aims to provide a concise study of IoT technology and its vulnerabilities to attacks that compromise its security. It also presents an overview of different attacks that can occur in RPL technology. Specifically, the paper delves deeper into the DIO Suppression attack, examining its impact on the routing service and the potential for deterioration.

References

P. Perazzo, C. Vallati, G. Anastasi, and G. Dini, “DIO suppression attack against routing in the internet of things,” IEEE Communications Letters, vol. 21, no. 11, pp. 2524–2527, Nov. 2017, doi: 10.1109/LCOMM.2017.2738629.

A. Agiollo, M. Conti, P. Kaliyar, T. N. Lin, and L. Pajola, “DETONAR: Detection of Routing Attacks in RPL-Based IoT,” IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1178–1190, Jun. 2021, doi: 10.1109/TNSM.2021.3075496.

R. Sahay, G. Geethakumari, and B. Mitra, “A novel Network Partitioning Attack against Routing Protocol in Internet of Things,” Ad Hoc Networks, vol. 121, Oct. 2021, doi: 10.1016/j.adhoc.2021.102583.

L. Wallgren, S. Raza, and T. Voigt, “Routing attacks and countermeasures in the RPL-based internet of things,” Int J Distrib Sens Netw, vol. 2013, 2013, doi: 10.1155/2013/794326.

A. Raoof, A. Matrawy, and C. H. Lung, “Routing Attacks and Mitigation Methods for RPL-Based Internet of Things,” IEEE Communications Surveys and Tutorials, vol. 21, no. 2, pp. 1582–1606, Apr. 2019, doi: 10.1109/COMST.2018.2885894.

C. Pu, “Sybil attack in RPL-based internet of things: Analysis and defenses,” IEEE Internet Things J, vol. 7, no. 6, pp. 4937–4949, Jun. 2020, doi: 10.1109/JIOT.2020.2971463.

K. Avila, D. Jabba, and J. Gomez, “A nonlinear robust sliding mode controller with auxiliary dynamic system for the hovering flight of a tilt tri-rotor UAV,” Applied Sciences (Switzerland), vol. 10, no. 18. MDPI AG, Sep. 01, 2020. doi: 10.3390/APP10186472.

A. Verma and V. Ranga, “The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things,” Computing, vol. 103, no. 7, pp. 1479–1500, Jul. 2021, doi: 10.1007/s00607-020-00862-1.

A. Verma and V. Ranga, “Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review,” IEEE Sens J, vol. 20, no. 11, pp. 5666–5690, Jun. 2020, doi: 10.1109/JSEN.2020.2973677.

A. Verma and V. Ranga, “Mitigation of DIS flooding attacks in RPL-based 6LoWPAN networks,” Transactions on Emerging Telecommunications Technologies, vol. 31, no. 2, Feb. 2020, doi: 10.1002/ett.3802.

S. A. A. Hakeem, A. A. Hady, and H. W. Kim, “RPL routing protocol performance in smart grid applications based wireless sensors: Experimental and simulated analysis,” Electronics (Switzerland), vol. 8, no. 2, Feb. 2019, doi: 10.3390/electronics8020186.

IEEE Communications Society., IEEE Computer Society., and Institute of Electrical and Electronics Engineers, 2019 International Conference on Computing, Networking and Communications (ICNC).

Shram Sadhana Bombay Trust College of Engineering and Technology, IEEE Computer Society, Institute of Electrical and Electronics Engineers. Bombay Section, and Institute of Electrical and Electronics Engineers., ICGTSPICC 2016 : International Conference on Global Trends in Signal Processing, Information Computing and Communication : proceedings : 22-24 December 2016, Jalgaon, Maharashtra, India.

M. Nikravan, A. Movaghar, and M. Hosseinzadeh, “A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy Networks,” Wirel Pers Commun, vol. 99, no. 2, pp. 1035–1059, Mar. 2018, doi: 10.1007/s11277-017-5165-4.

J. Rani, A. Dhingra, and V. Sindhu, “A Detailed Review of the IoT with Detection of Sinkhole Attacks in RPL based network,” in 2022 International Conference on Communication, Computing and Internet of Things, IC3IoT 2022 - Proceedings, 2022. doi: 10.1109/IC3IOT53935.2022.9768015.

A. Dhingra and V. Sindhu, “A Study of RPL Attacks and Defense Mechanisms in the Internet of Things Network,” in Proceedings of International Conference on Computing, Communication, Security.

Nisha, A. Dhingra, and V. Sindhu, “A Review of DIS-Flooding Attacks in RPL based IoT Network,” in 2022 International Conference on Communication, Computing and Internet of Things, IC3IoT 2022 - Proceedings, 2022. doi: 10.1109/IC3IOT53935.2022.9767875.

Downloads

Published

30-09-2023

How to Cite

Pooja Suhag, Akshaya Dhingra, Vikas Sindhu, & Anil Sangwan. (2023). A Comprehensive Review of Low-Power Internet of Things Networks under DIO- Suppression Attacks and Countermeasures. International Journal for Research Publication and Seminar, 14(4), 151–159. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/436