Sharma Divya, Mishra Ishani, Jain Sanjay, International Journal of Advance Research, Ideas and Innovations in
Technology.
© 2017, IJARIIT All Rights Reserved Page | 692
ISSN: 2454-132X
Impact factor: 4.295
(Volume3, Issue1)
Available online at: www.ijariit.com
A Detailed Classification of Routing Attacks against RPL in
Internet of Things
Divya Sharma
Sr. Assistant Professor,
Department of ECE,
New Horizon College of Engg,
Bangalore
Ishani Mishra
Sr. Assistant Professor,
Department of ECE,
New Horizon College of Engg,
Bangalore
Dr. Sanjay Jain
HOD- Department of ECE,
New Horizon College of Engg,
Bangalore
Abstract-With the advancement in mobile computing and wireless communications, a new paradigm called Internet of Things,
is generating a lot of research interest and industrial revolution. The increasing interest for this paradigm has resulted in the
large-scale deployment of Low power and Lossy Networks (LLN), such as wireless sensor networks and home automation
systems. These networks are typically composed of many embedded devices with limited power, memory, and processing
resources interconnected by a variety of links, such as IEEE 802.15.4 or low-power Wi-Fi. These networks have a wide scope
of applications such as industrial monitoring, connected home, health care, environmental monitoring, urban sensor
networks, energy management, and assets tracking etc.RFC 7228. In order to address the specific properties and constraints of
these networks RPL (Routing Protocol for low power Lossy network) has been developed by the IETF working group [ROLL
WG]. RPL is a lightweight, rank based routing protocol. However, this routing protocol is exposed to various attacks which
can significantly impact the network resources and its performance. This paper presents an elaborate classification of the
possible attacks against RPL in IoT network. Further, we have analysed and compared the severity of these attacks.
Keywords: Internet of things, LLN, RPL, security attacks.
I. INTRODUCTION
According to International Telecommunication Union (ITU) and the IoT European Research Cluster (IERC) the Internet of
Things (IoT) is defined as a vivacious worldwide network infrastructure with self configuring capabilities centered on standard
and communication protocols in which physical and virtual “things” have identities, physical features and virtual characteristics ,
communicate via intelligent interfaces and integrate into the information network in a seamless fashion (Fig. 1). IoT can be
viewed as a fusion of heterogeneous networks that brings not only the same security challenges present in sensor networks, mobile
telecommunications and the internet but also some peculiar and accentuated issues, like, network privacy problems, authentication
on a heterogeneous network, access control challenges and secure routing among these heterogeneous devices.
These networks have strong resource constraints (energy, memory, processing) and their communication links are by nature
characterized by a high loss rate and a low throughput. Moreover, the traffic patterns are not simply defined according to a point-
to point schema. In many cases, the devices also communicate according to point-to-multipoint and multipoint-to point patterns.
Existing routing protocols are not suitable to deal with these requirements [3]. Therefore a complete stack of standardized
protocols has been developed including the IEEE 802.15.4 standard protocol for the communication layers in wireless personal
area networks (WPAN) and the 6LowPAN protocol which defines encapsulation and header compression mechanisms between
IPv6 and 802.15.4. At the routing layer, the ROLL1 working group has proposed a protocol called RPL (Routing Protocol for
Low power and Lossy Networks) based on IPv6 [4]. Due to their constrained nature RPL-based networks may be exposed to a
large variety of security attacks. Even if cryptographic mechanisms are used in first defense, they only prevent external attacks.
When nodes are compromised and become as a result internal attackers, cryptographic techniques become unavailing and can no
longer protect the network. In [5], authors performed a study of security in 6LowPAN networks including the routing protocol