Loading…

Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks

An Internet of Things (IoT) refers to a network of smart devices that enable data collection and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) to bring the concept of IoT into reality. As a result, RPL has become a standard routin...

Full description

Saved in:
Bibliographic Details
Published in:IEEE access 2023-01, Vol.11, p.1-1
Main Authors: Al-Sarawi, Shadi, Anbar, Mohammed, Alabsi, Basim Ahmad, Aladaileh, Mohammad Adnan, Rihan, Shaza Dawood Ahmed
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c409t-64298553e9ddd952ed812921a92d6e34259cfbd5fc386284dd5c4e6b29e1a36e3
cites cdi_FETCH-LOGICAL-c409t-64298553e9ddd952ed812921a92d6e34259cfbd5fc386284dd5c4e6b29e1a36e3
container_end_page 1
container_issue
container_start_page 1
container_title IEEE access
container_volume 11
creator Al-Sarawi, Shadi
Anbar, Mohammed
Alabsi, Basim Ahmad
Aladaileh, Mohammad Adnan
Rihan, Shaza Dawood Ahmed
description An Internet of Things (IoT) refers to a network of smart devices that enable data collection and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) to bring the concept of IoT into reality. As a result, RPL has become a standard routing protocol for connecting IPv6 to IoT networks. However, like any other network protocol, RPL is vulnerable to various attacks, including sinkhole attacks, which can disrupt network operations. Sinkhole attacks exploit vulnerabilities in RPL by manipulating routing preferences by disseminating falsified data, leading to an abnormal increase in traffic directed toward the attacker's node. This paper introduces the Passive Rule-based Approach (PRBA) to detect sinkhole nodes in RPL-based IoT networks. The PRBA approach relies on three proposed behavioral indicators: (I) Bi-Directional behavior, (II) Bi-Directional Frequently behavior, and (III) Power Consumption behavior. The proposed PRBA approach was implemented and evaluated using the COOJA simulator and compared with state-of-the-art approaches. Simulation results demonstrate that the PRBA approach achieves a detection accuracy rate ranging from 90% to 100%, with a false-positive rate ranging from 0% to 0.2%. Additionally, due to its carefully designed deployment strategy, the proposed approach satisfies the power consumption requirements of constrained nodes without causing an increase in power consumption.
doi_str_mv 10.1109/ACCESS.2023.3310242
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_ACCESS_2023_3310242</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10234668</ieee_id><doaj_id>oai_doaj_org_article_2902d7b36788408bbed21ed57a2ca0a1</doaj_id><sourcerecordid>2862613576</sourcerecordid><originalsourceid>FETCH-LOGICAL-c409t-64298553e9ddd952ed812921a92d6e34259cfbd5fc386284dd5c4e6b29e1a36e3</originalsourceid><addsrcrecordid>eNpNUU1vEzEQXSEqUZX-AjhY4rypPV577WMIpY0U0aopVyyvPdtsEtbBdkD8-7pshDqXGY3ex2heVX1gdMYY1VfzxeJ6vZ4BBT7jnFFo4E11Dkzqmgsu376a31WXKW1pKVVWoj2vftzblIbfSB6Oe6w_24SezA-HGKzbkBzIF8zoMlkP424T9kjmOVu3I8NIHu5XJ_xyzBhHzCT05HEzjE-JfMP8J8Rdel-d9Xaf8PLUL6rvX68fF7f16u5muZivatdQnWvZgFZCcNTeey0AvWKggVkNXiJvQGjXd170jisJqvFeuAZlBxqZ5QVxUS0nXR_s1hzi8NPGvybYwfxbhPhkbMyD26MBTcG3HZetUg1VXYceGHrRWnCWWla0Pk1a5Qu_jpiy2YZjHMv5Boq7ZFy0sqD4hHIxpBSx_-_KqHnJxUy5mJdczCmXwvo4sQZEfMUA3kip-DN81oe3</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2862613576</pqid></control><display><type>article</type><title>Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks</title><source>IEEE Xplore Open Access Journals</source><creator>Al-Sarawi, Shadi ; Anbar, Mohammed ; Alabsi, Basim Ahmad ; Aladaileh, Mohammad Adnan ; Rihan, Shaza Dawood Ahmed</creator><creatorcontrib>Al-Sarawi, Shadi ; Anbar, Mohammed ; Alabsi, Basim Ahmad ; Aladaileh, Mohammad Adnan ; Rihan, Shaza Dawood Ahmed</creatorcontrib><description>An Internet of Things (IoT) refers to a network of smart devices that enable data collection and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) to bring the concept of IoT into reality. As a result, RPL has become a standard routing protocol for connecting IPv6 to IoT networks. However, like any other network protocol, RPL is vulnerable to various attacks, including sinkhole attacks, which can disrupt network operations. Sinkhole attacks exploit vulnerabilities in RPL by manipulating routing preferences by disseminating falsified data, leading to an abnormal increase in traffic directed toward the attacker's node. This paper introduces the Passive Rule-based Approach (PRBA) to detect sinkhole nodes in RPL-based IoT networks. The PRBA approach relies on three proposed behavioral indicators: (I) Bi-Directional behavior, (II) Bi-Directional Frequently behavior, and (III) Power Consumption behavior. The proposed PRBA approach was implemented and evaluated using the COOJA simulator and compared with state-of-the-art approaches. Simulation results demonstrate that the PRBA approach achieves a detection accuracy rate ranging from 90% to 100%, with a false-positive rate ranging from 0% to 0.2%. Additionally, due to its carefully designed deployment strategy, the proposed approach satisfies the power consumption requirements of constrained nodes without causing an increase in power consumption.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2023.3310242</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Behavioral sciences ; Data collection ; Distributed Denial of Service (DDoS) ; International Data Corporation (IDC) ; Internet of Things ; Internet of Things (IoT) ; Internet Protocol Version 6 (IPv6) ; IP (Internet Protocol) ; IP networks ; IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) ; Monitoring ; Nodes ; Personal area networks ; Power consumption ; Power demand ; Power management ; Routing ; Routing (telecommunications) ; Routing Protocol for Low-Power and Lossy Networks (RPL) ; Routing protocols ; Sinkholes ; Wireless networks</subject><ispartof>IEEE access, 2023-01, Vol.11, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c409t-64298553e9ddd952ed812921a92d6e34259cfbd5fc386284dd5c4e6b29e1a36e3</citedby><cites>FETCH-LOGICAL-c409t-64298553e9ddd952ed812921a92d6e34259cfbd5fc386284dd5c4e6b29e1a36e3</cites><orcidid>0000-0003-1421-4598 ; 0000-0003-2987-8856 ; 0000-0002-7026-6408</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10234668$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,27612,27903,27904,54912</link.rule.ids></links><search><creatorcontrib>Al-Sarawi, Shadi</creatorcontrib><creatorcontrib>Anbar, Mohammed</creatorcontrib><creatorcontrib>Alabsi, Basim Ahmad</creatorcontrib><creatorcontrib>Aladaileh, Mohammad Adnan</creatorcontrib><creatorcontrib>Rihan, Shaza Dawood Ahmed</creatorcontrib><title>Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks</title><title>IEEE access</title><addtitle>Access</addtitle><description>An Internet of Things (IoT) refers to a network of smart devices that enable data collection and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) to bring the concept of IoT into reality. As a result, RPL has become a standard routing protocol for connecting IPv6 to IoT networks. However, like any other network protocol, RPL is vulnerable to various attacks, including sinkhole attacks, which can disrupt network operations. Sinkhole attacks exploit vulnerabilities in RPL by manipulating routing preferences by disseminating falsified data, leading to an abnormal increase in traffic directed toward the attacker's node. This paper introduces the Passive Rule-based Approach (PRBA) to detect sinkhole nodes in RPL-based IoT networks. The PRBA approach relies on three proposed behavioral indicators: (I) Bi-Directional behavior, (II) Bi-Directional Frequently behavior, and (III) Power Consumption behavior. The proposed PRBA approach was implemented and evaluated using the COOJA simulator and compared with state-of-the-art approaches. Simulation results demonstrate that the PRBA approach achieves a detection accuracy rate ranging from 90% to 100%, with a false-positive rate ranging from 0% to 0.2%. Additionally, due to its carefully designed deployment strategy, the proposed approach satisfies the power consumption requirements of constrained nodes without causing an increase in power consumption.</description><subject>Behavioral sciences</subject><subject>Data collection</subject><subject>Distributed Denial of Service (DDoS)</subject><subject>International Data Corporation (IDC)</subject><subject>Internet of Things</subject><subject>Internet of Things (IoT)</subject><subject>Internet Protocol Version 6 (IPv6)</subject><subject>IP (Internet Protocol)</subject><subject>IP networks</subject><subject>IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN)</subject><subject>Monitoring</subject><subject>Nodes</subject><subject>Personal area networks</subject><subject>Power consumption</subject><subject>Power demand</subject><subject>Power management</subject><subject>Routing</subject><subject>Routing (telecommunications)</subject><subject>Routing Protocol for Low-Power and Lossy Networks (RPL)</subject><subject>Routing protocols</subject><subject>Sinkholes</subject><subject>Wireless networks</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1vEzEQXSEqUZX-AjhY4rypPV577WMIpY0U0aopVyyvPdtsEtbBdkD8-7pshDqXGY3ex2heVX1gdMYY1VfzxeJ6vZ4BBT7jnFFo4E11Dkzqmgsu376a31WXKW1pKVVWoj2vftzblIbfSB6Oe6w_24SezA-HGKzbkBzIF8zoMlkP424T9kjmOVu3I8NIHu5XJ_xyzBhHzCT05HEzjE-JfMP8J8Rdel-d9Xaf8PLUL6rvX68fF7f16u5muZivatdQnWvZgFZCcNTeey0AvWKggVkNXiJvQGjXd170jisJqvFeuAZlBxqZ5QVxUS0nXR_s1hzi8NPGvybYwfxbhPhkbMyD26MBTcG3HZetUg1VXYceGHrRWnCWWla0Pk1a5Qu_jpiy2YZjHMv5Boq7ZFy0sqD4hHIxpBSx_-_KqHnJxUy5mJdczCmXwvo4sQZEfMUA3kip-DN81oe3</recordid><startdate>20230101</startdate><enddate>20230101</enddate><creator>Al-Sarawi, Shadi</creator><creator>Anbar, Mohammed</creator><creator>Alabsi, Basim Ahmad</creator><creator>Aladaileh, Mohammad Adnan</creator><creator>Rihan, Shaza Dawood Ahmed</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-1421-4598</orcidid><orcidid>https://orcid.org/0000-0003-2987-8856</orcidid><orcidid>https://orcid.org/0000-0002-7026-6408</orcidid></search><sort><creationdate>20230101</creationdate><title>Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks</title><author>Al-Sarawi, Shadi ; Anbar, Mohammed ; Alabsi, Basim Ahmad ; Aladaileh, Mohammad Adnan ; Rihan, Shaza Dawood Ahmed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c409t-64298553e9ddd952ed812921a92d6e34259cfbd5fc386284dd5c4e6b29e1a36e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Behavioral sciences</topic><topic>Data collection</topic><topic>Distributed Denial of Service (DDoS)</topic><topic>International Data Corporation (IDC)</topic><topic>Internet of Things</topic><topic>Internet of Things (IoT)</topic><topic>Internet Protocol Version 6 (IPv6)</topic><topic>IP (Internet Protocol)</topic><topic>IP networks</topic><topic>IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN)</topic><topic>Monitoring</topic><topic>Nodes</topic><topic>Personal area networks</topic><topic>Power consumption</topic><topic>Power demand</topic><topic>Power management</topic><topic>Routing</topic><topic>Routing (telecommunications)</topic><topic>Routing Protocol for Low-Power and Lossy Networks (RPL)</topic><topic>Routing protocols</topic><topic>Sinkholes</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Al-Sarawi, Shadi</creatorcontrib><creatorcontrib>Anbar, Mohammed</creatorcontrib><creatorcontrib>Alabsi, Basim Ahmad</creatorcontrib><creatorcontrib>Aladaileh, Mohammad Adnan</creatorcontrib><creatorcontrib>Rihan, Shaza Dawood Ahmed</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Xplore Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Al-Sarawi, Shadi</au><au>Anbar, Mohammed</au><au>Alabsi, Basim Ahmad</au><au>Aladaileh, Mohammad Adnan</au><au>Rihan, Shaza Dawood Ahmed</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2023-01-01</date><risdate>2023</risdate><volume>11</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>An Internet of Things (IoT) refers to a network of smart devices that enable data collection and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) to bring the concept of IoT into reality. As a result, RPL has become a standard routing protocol for connecting IPv6 to IoT networks. However, like any other network protocol, RPL is vulnerable to various attacks, including sinkhole attacks, which can disrupt network operations. Sinkhole attacks exploit vulnerabilities in RPL by manipulating routing preferences by disseminating falsified data, leading to an abnormal increase in traffic directed toward the attacker's node. This paper introduces the Passive Rule-based Approach (PRBA) to detect sinkhole nodes in RPL-based IoT networks. The PRBA approach relies on three proposed behavioral indicators: (I) Bi-Directional behavior, (II) Bi-Directional Frequently behavior, and (III) Power Consumption behavior. The proposed PRBA approach was implemented and evaluated using the COOJA simulator and compared with state-of-the-art approaches. Simulation results demonstrate that the PRBA approach achieves a detection accuracy rate ranging from 90% to 100%, with a false-positive rate ranging from 0% to 0.2%. Additionally, due to its carefully designed deployment strategy, the proposed approach satisfies the power consumption requirements of constrained nodes without causing an increase in power consumption.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2023.3310242</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0003-1421-4598</orcidid><orcidid>https://orcid.org/0000-0003-2987-8856</orcidid><orcidid>https://orcid.org/0000-0002-7026-6408</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2023-01, Vol.11, p.1-1
issn 2169-3536
2169-3536
language eng
recordid cdi_crossref_primary_10_1109_ACCESS_2023_3310242
source IEEE Xplore Open Access Journals
subjects Behavioral sciences
Data collection
Distributed Denial of Service (DDoS)
International Data Corporation (IDC)
Internet of Things
Internet of Things (IoT)
Internet Protocol Version 6 (IPv6)
IP (Internet Protocol)
IP networks
IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN)
Monitoring
Nodes
Personal area networks
Power consumption
Power demand
Power management
Routing
Routing (telecommunications)
Routing Protocol for Low-Power and Lossy Networks (RPL)
Routing protocols
Sinkholes
Wireless networks
title Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T12%3A32%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Passive%20Rule-Based%20Approach%20to%20Detect%20Sinkhole%20Attack%20in%20RPL-Based%20Internet%20of%20Things%20Networks&rft.jtitle=IEEE%20access&rft.au=Al-Sarawi,%20Shadi&rft.date=2023-01-01&rft.volume=11&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2023.3310242&rft_dat=%3Cproquest_cross%3E2862613576%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c409t-64298553e9ddd952ed812921a92d6e34259cfbd5fc386284dd5c4e6b29e1a36e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2862613576&rft_id=info:pmid/&rft_ieee_id=10234668&rfr_iscdi=true