Loading…
Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
An Internet of Things (IoT) refers to a network of smart devices that enable data collection and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) to bring the concept of IoT into reality. As a result, RPL has become a standard routin...
Saved in:
Published in: | IEEE access 2023-01, Vol.11, p.1-1 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c409t-64298553e9ddd952ed812921a92d6e34259cfbd5fc386284dd5c4e6b29e1a36e3 |
---|---|
cites | cdi_FETCH-LOGICAL-c409t-64298553e9ddd952ed812921a92d6e34259cfbd5fc386284dd5c4e6b29e1a36e3 |
container_end_page | 1 |
container_issue | |
container_start_page | 1 |
container_title | IEEE access |
container_volume | 11 |
creator | Al-Sarawi, Shadi Anbar, Mohammed Alabsi, Basim Ahmad Aladaileh, Mohammad Adnan Rihan, Shaza Dawood Ahmed |
description | An Internet of Things (IoT) refers to a network of smart devices that enable data collection and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) to bring the concept of IoT into reality. As a result, RPL has become a standard routing protocol for connecting IPv6 to IoT networks. However, like any other network protocol, RPL is vulnerable to various attacks, including sinkhole attacks, which can disrupt network operations. Sinkhole attacks exploit vulnerabilities in RPL by manipulating routing preferences by disseminating falsified data, leading to an abnormal increase in traffic directed toward the attacker's node. This paper introduces the Passive Rule-based Approach (PRBA) to detect sinkhole nodes in RPL-based IoT networks. The PRBA approach relies on three proposed behavioral indicators: (I) Bi-Directional behavior, (II) Bi-Directional Frequently behavior, and (III) Power Consumption behavior. The proposed PRBA approach was implemented and evaluated using the COOJA simulator and compared with state-of-the-art approaches. Simulation results demonstrate that the PRBA approach achieves a detection accuracy rate ranging from 90% to 100%, with a false-positive rate ranging from 0% to 0.2%. Additionally, due to its carefully designed deployment strategy, the proposed approach satisfies the power consumption requirements of constrained nodes without causing an increase in power consumption. |
doi_str_mv | 10.1109/ACCESS.2023.3310242 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_ACCESS_2023_3310242</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10234668</ieee_id><doaj_id>oai_doaj_org_article_2902d7b36788408bbed21ed57a2ca0a1</doaj_id><sourcerecordid>2862613576</sourcerecordid><originalsourceid>FETCH-LOGICAL-c409t-64298553e9ddd952ed812921a92d6e34259cfbd5fc386284dd5c4e6b29e1a36e3</originalsourceid><addsrcrecordid>eNpNUU1vEzEQXSEqUZX-AjhY4rypPV577WMIpY0U0aopVyyvPdtsEtbBdkD8-7pshDqXGY3ex2heVX1gdMYY1VfzxeJ6vZ4BBT7jnFFo4E11Dkzqmgsu376a31WXKW1pKVVWoj2vftzblIbfSB6Oe6w_24SezA-HGKzbkBzIF8zoMlkP424T9kjmOVu3I8NIHu5XJ_xyzBhHzCT05HEzjE-JfMP8J8Rdel-d9Xaf8PLUL6rvX68fF7f16u5muZivatdQnWvZgFZCcNTeey0AvWKggVkNXiJvQGjXd170jisJqvFeuAZlBxqZ5QVxUS0nXR_s1hzi8NPGvybYwfxbhPhkbMyD26MBTcG3HZetUg1VXYceGHrRWnCWWla0Pk1a5Qu_jpiy2YZjHMv5Boq7ZFy0sqD4hHIxpBSx_-_KqHnJxUy5mJdczCmXwvo4sQZEfMUA3kip-DN81oe3</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2862613576</pqid></control><display><type>article</type><title>Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks</title><source>IEEE Xplore Open Access Journals</source><creator>Al-Sarawi, Shadi ; Anbar, Mohammed ; Alabsi, Basim Ahmad ; Aladaileh, Mohammad Adnan ; Rihan, Shaza Dawood Ahmed</creator><creatorcontrib>Al-Sarawi, Shadi ; Anbar, Mohammed ; Alabsi, Basim Ahmad ; Aladaileh, Mohammad Adnan ; Rihan, Shaza Dawood Ahmed</creatorcontrib><description>An Internet of Things (IoT) refers to a network of smart devices that enable data collection and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) to bring the concept of IoT into reality. As a result, RPL has become a standard routing protocol for connecting IPv6 to IoT networks. However, like any other network protocol, RPL is vulnerable to various attacks, including sinkhole attacks, which can disrupt network operations. Sinkhole attacks exploit vulnerabilities in RPL by manipulating routing preferences by disseminating falsified data, leading to an abnormal increase in traffic directed toward the attacker's node. This paper introduces the Passive Rule-based Approach (PRBA) to detect sinkhole nodes in RPL-based IoT networks. The PRBA approach relies on three proposed behavioral indicators: (I) Bi-Directional behavior, (II) Bi-Directional Frequently behavior, and (III) Power Consumption behavior. The proposed PRBA approach was implemented and evaluated using the COOJA simulator and compared with state-of-the-art approaches. Simulation results demonstrate that the PRBA approach achieves a detection accuracy rate ranging from 90% to 100%, with a false-positive rate ranging from 0% to 0.2%. Additionally, due to its carefully designed deployment strategy, the proposed approach satisfies the power consumption requirements of constrained nodes without causing an increase in power consumption.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2023.3310242</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Behavioral sciences ; Data collection ; Distributed Denial of Service (DDoS) ; International Data Corporation (IDC) ; Internet of Things ; Internet of Things (IoT) ; Internet Protocol Version 6 (IPv6) ; IP (Internet Protocol) ; IP networks ; IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) ; Monitoring ; Nodes ; Personal area networks ; Power consumption ; Power demand ; Power management ; Routing ; Routing (telecommunications) ; Routing Protocol for Low-Power and Lossy Networks (RPL) ; Routing protocols ; Sinkholes ; Wireless networks</subject><ispartof>IEEE access, 2023-01, Vol.11, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c409t-64298553e9ddd952ed812921a92d6e34259cfbd5fc386284dd5c4e6b29e1a36e3</citedby><cites>FETCH-LOGICAL-c409t-64298553e9ddd952ed812921a92d6e34259cfbd5fc386284dd5c4e6b29e1a36e3</cites><orcidid>0000-0003-1421-4598 ; 0000-0003-2987-8856 ; 0000-0002-7026-6408</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10234668$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,27612,27903,27904,54912</link.rule.ids></links><search><creatorcontrib>Al-Sarawi, Shadi</creatorcontrib><creatorcontrib>Anbar, Mohammed</creatorcontrib><creatorcontrib>Alabsi, Basim Ahmad</creatorcontrib><creatorcontrib>Aladaileh, Mohammad Adnan</creatorcontrib><creatorcontrib>Rihan, Shaza Dawood Ahmed</creatorcontrib><title>Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks</title><title>IEEE access</title><addtitle>Access</addtitle><description>An Internet of Things (IoT) refers to a network of smart devices that enable data collection and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) to bring the concept of IoT into reality. As a result, RPL has become a standard routing protocol for connecting IPv6 to IoT networks. However, like any other network protocol, RPL is vulnerable to various attacks, including sinkhole attacks, which can disrupt network operations. Sinkhole attacks exploit vulnerabilities in RPL by manipulating routing preferences by disseminating falsified data, leading to an abnormal increase in traffic directed toward the attacker's node. This paper introduces the Passive Rule-based Approach (PRBA) to detect sinkhole nodes in RPL-based IoT networks. The PRBA approach relies on three proposed behavioral indicators: (I) Bi-Directional behavior, (II) Bi-Directional Frequently behavior, and (III) Power Consumption behavior. The proposed PRBA approach was implemented and evaluated using the COOJA simulator and compared with state-of-the-art approaches. Simulation results demonstrate that the PRBA approach achieves a detection accuracy rate ranging from 90% to 100%, with a false-positive rate ranging from 0% to 0.2%. Additionally, due to its carefully designed deployment strategy, the proposed approach satisfies the power consumption requirements of constrained nodes without causing an increase in power consumption.</description><subject>Behavioral sciences</subject><subject>Data collection</subject><subject>Distributed Denial of Service (DDoS)</subject><subject>International Data Corporation (IDC)</subject><subject>Internet of Things</subject><subject>Internet of Things (IoT)</subject><subject>Internet Protocol Version 6 (IPv6)</subject><subject>IP (Internet Protocol)</subject><subject>IP networks</subject><subject>IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN)</subject><subject>Monitoring</subject><subject>Nodes</subject><subject>Personal area networks</subject><subject>Power consumption</subject><subject>Power demand</subject><subject>Power management</subject><subject>Routing</subject><subject>Routing (telecommunications)</subject><subject>Routing Protocol for Low-Power and Lossy Networks (RPL)</subject><subject>Routing protocols</subject><subject>Sinkholes</subject><subject>Wireless networks</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1vEzEQXSEqUZX-AjhY4rypPV577WMIpY0U0aopVyyvPdtsEtbBdkD8-7pshDqXGY3ex2heVX1gdMYY1VfzxeJ6vZ4BBT7jnFFo4E11Dkzqmgsu376a31WXKW1pKVVWoj2vftzblIbfSB6Oe6w_24SezA-HGKzbkBzIF8zoMlkP424T9kjmOVu3I8NIHu5XJ_xyzBhHzCT05HEzjE-JfMP8J8Rdel-d9Xaf8PLUL6rvX68fF7f16u5muZivatdQnWvZgFZCcNTeey0AvWKggVkNXiJvQGjXd170jisJqvFeuAZlBxqZ5QVxUS0nXR_s1hzi8NPGvybYwfxbhPhkbMyD26MBTcG3HZetUg1VXYceGHrRWnCWWla0Pk1a5Qu_jpiy2YZjHMv5Boq7ZFy0sqD4hHIxpBSx_-_KqHnJxUy5mJdczCmXwvo4sQZEfMUA3kip-DN81oe3</recordid><startdate>20230101</startdate><enddate>20230101</enddate><creator>Al-Sarawi, Shadi</creator><creator>Anbar, Mohammed</creator><creator>Alabsi, Basim Ahmad</creator><creator>Aladaileh, Mohammad Adnan</creator><creator>Rihan, Shaza Dawood Ahmed</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-1421-4598</orcidid><orcidid>https://orcid.org/0000-0003-2987-8856</orcidid><orcidid>https://orcid.org/0000-0002-7026-6408</orcidid></search><sort><creationdate>20230101</creationdate><title>Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks</title><author>Al-Sarawi, Shadi ; Anbar, Mohammed ; Alabsi, Basim Ahmad ; Aladaileh, Mohammad Adnan ; Rihan, Shaza Dawood Ahmed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c409t-64298553e9ddd952ed812921a92d6e34259cfbd5fc386284dd5c4e6b29e1a36e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Behavioral sciences</topic><topic>Data collection</topic><topic>Distributed Denial of Service (DDoS)</topic><topic>International Data Corporation (IDC)</topic><topic>Internet of Things</topic><topic>Internet of Things (IoT)</topic><topic>Internet Protocol Version 6 (IPv6)</topic><topic>IP (Internet Protocol)</topic><topic>IP networks</topic><topic>IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN)</topic><topic>Monitoring</topic><topic>Nodes</topic><topic>Personal area networks</topic><topic>Power consumption</topic><topic>Power demand</topic><topic>Power management</topic><topic>Routing</topic><topic>Routing (telecommunications)</topic><topic>Routing Protocol for Low-Power and Lossy Networks (RPL)</topic><topic>Routing protocols</topic><topic>Sinkholes</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Al-Sarawi, Shadi</creatorcontrib><creatorcontrib>Anbar, Mohammed</creatorcontrib><creatorcontrib>Alabsi, Basim Ahmad</creatorcontrib><creatorcontrib>Aladaileh, Mohammad Adnan</creatorcontrib><creatorcontrib>Rihan, Shaza Dawood Ahmed</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Xplore Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Al-Sarawi, Shadi</au><au>Anbar, Mohammed</au><au>Alabsi, Basim Ahmad</au><au>Aladaileh, Mohammad Adnan</au><au>Rihan, Shaza Dawood Ahmed</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2023-01-01</date><risdate>2023</risdate><volume>11</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>An Internet of Things (IoT) refers to a network of smart devices that enable data collection and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) to bring the concept of IoT into reality. As a result, RPL has become a standard routing protocol for connecting IPv6 to IoT networks. However, like any other network protocol, RPL is vulnerable to various attacks, including sinkhole attacks, which can disrupt network operations. Sinkhole attacks exploit vulnerabilities in RPL by manipulating routing preferences by disseminating falsified data, leading to an abnormal increase in traffic directed toward the attacker's node. This paper introduces the Passive Rule-based Approach (PRBA) to detect sinkhole nodes in RPL-based IoT networks. The PRBA approach relies on three proposed behavioral indicators: (I) Bi-Directional behavior, (II) Bi-Directional Frequently behavior, and (III) Power Consumption behavior. The proposed PRBA approach was implemented and evaluated using the COOJA simulator and compared with state-of-the-art approaches. Simulation results demonstrate that the PRBA approach achieves a detection accuracy rate ranging from 90% to 100%, with a false-positive rate ranging from 0% to 0.2%. Additionally, due to its carefully designed deployment strategy, the proposed approach satisfies the power consumption requirements of constrained nodes without causing an increase in power consumption.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2023.3310242</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0003-1421-4598</orcidid><orcidid>https://orcid.org/0000-0003-2987-8856</orcidid><orcidid>https://orcid.org/0000-0002-7026-6408</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2023-01, Vol.11, p.1-1 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_crossref_primary_10_1109_ACCESS_2023_3310242 |
source | IEEE Xplore Open Access Journals |
subjects | Behavioral sciences Data collection Distributed Denial of Service (DDoS) International Data Corporation (IDC) Internet of Things Internet of Things (IoT) Internet Protocol Version 6 (IPv6) IP (Internet Protocol) IP networks IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) Monitoring Nodes Personal area networks Power consumption Power demand Power management Routing Routing (telecommunications) Routing Protocol for Low-Power and Lossy Networks (RPL) Routing protocols Sinkholes Wireless networks |
title | Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T12%3A32%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Passive%20Rule-Based%20Approach%20to%20Detect%20Sinkhole%20Attack%20in%20RPL-Based%20Internet%20of%20Things%20Networks&rft.jtitle=IEEE%20access&rft.au=Al-Sarawi,%20Shadi&rft.date=2023-01-01&rft.volume=11&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2023.3310242&rft_dat=%3Cproquest_cross%3E2862613576%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c409t-64298553e9ddd952ed812921a92d6e34259cfbd5fc386284dd5c4e6b29e1a36e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2862613576&rft_id=info:pmid/&rft_ieee_id=10234668&rfr_iscdi=true |