Cooperative IDS for Detecting Collaborative Attacks in RPL-AODV Protocol in Internet of Everything

Cooperative IDS for Detecting Collaborative Attacks in RPL-AODV Protocol in Internet of Everything

Erukala Suresh Babu, Bhukya Padma, Soumya Ranjan Nayak, Nazeeruddin Mohammad, Uttam Ghosh
Copyright: © 2023 |Pages: 33
DOI: 10.4018/JDM.324099
Article PDF Download
Open access articles are freely available for download

Abstract

Internet of everything (IoET) is one of the key integrators in Industry 4.0, which contributes to large-scale deployment of low-power and lossy (LLN) networks to connecting people, processes, data, and things. The RPL is one of the unique standardized routing protocols that enable efficient use of smart devices energy, compute resources to address the properties and constraints of LLN networks. The authors investigate the RPL-AODV routing protocol's performance in combining the advantages of both RPL and AODV routing protocol, which works together in a low power resource-constrained network. The main challenging issue is collaborating the AODV and RPL routing protocol in the LLN network. This paper also models the collaborative attacks such as wormhole, blackhole attack for AODV, and rank and sinkhole attacks to exploit the vulnerability of RPL protocol. Finally, the cooperative IDS combining specification-based and signature-based IDS is proposed to detect the collaborative attacks against the RPL-AODV routing protocol that effectively monitors and provides security to the LLN networks.
Article Preview
Top

Introduction

The advancement of technological capabilities bringing in ubiquitous connectivity and low-powered Devices in the Internet of Things (IoT) are a flourishing phenomenon. There has been a meteoric rise in the number of internet-connected devices around us in recent years. Global tech advisory firm Gartner has predicted that by the end of 2021, there will be more than 50 billion connected devices, which is approximately three times the current human population and 70 billion in the next five years. The Internet of Everything (IoE) is one of the key technologies. integrators in industry-4.0, which contributes to the large-scale deployment of low-power and lossy (LLN) networks (Ghaleb et al., 2018) that enable networked connection among People, processes, data, and things here Things are physical devices and objects connected to the internet for intelligent decision-making; Real-time insight Data is mainly used to leverage these data into more useful information for decision-making, and the process is used to deliver the right information to the right person (or machine) at the right time and finally, People involved in more Relevant, valuable ways. Despite the rise, one of the major inconveniences slowing rapid adaption is the ‘security’ (Mutchler & Warkentin, 2020; Zhou & Jing, 2020) of these devices (Suresh Babu et al., 2016). The myriad of companies that manufacture them and the multiple protocols from the many standards that existing out there is one of the major reasons why there is still a non-standardized approach to solving these problems. In particular, we look at the Mirai malware family, which became notoriously popular in 2016 when it was first used to coordinate a massive denial of service (DoS) (Babu et al., 2016; Van Kerkhoven et al., 2019; Vishwakarma & Jain, 2020) attack using an army of innocent IoT devices (Babu, Dadi, Singh et al, 2022; Hosen et al., 2020; Nagarajan et al., 2021). This attack is part of the bigger picture indicating the rise of attacks using a legion of “compromised devices that the end-users are unaware of. In addition to the security issue, LLN Networks also possess some other challenging issues, such as (1) the maximum The size of the packet at the physical layer is 127 bytes, which results in the maximum The size of the frame at the data link layer is 102 bytes (Babu, Kavati, Nayak et al, 2022; Babu et al., 2015). If we security parameter, it includes security overhead, which is still reduced to 81 bytes on the link layer. (2) Low bandwidth for such a constrained network includes data rates of 20 kbps, 40kbps, and 250 kbps for each physical layer defined at 868 MHz, 915 MHz, and 2.4 GHz, respectively, (3) Device location is not predefined. Sometimes devices move to a new location, and (4) Devices in LLN may go to sleep for energy conservation. Such devices can’t communicate when they are in sleep mode. (5) It consists of a large number of restricted devices with low power and processing, limited memory, and energy when the devices are battery-operated. (6) All the nodes in LLN are connected through lossy links, which are generally not stable and supports low data rates.

Complete Article List

Search this Journal:
Reset
Volume 35: 1 Issue (2024)
Volume 34: 3 Issues (2023)
Volume 33: 5 Issues (2022): 4 Released, 1 Forthcoming
Volume 32: 4 Issues (2021)
Volume 31: 4 Issues (2020)
Volume 30: 4 Issues (2019)
Volume 29: 4 Issues (2018)
Volume 28: 4 Issues (2017)
Volume 27: 4 Issues (2016)
Volume 26: 4 Issues (2015)
Volume 25: 4 Issues (2014)
Volume 24: 4 Issues (2013)
Volume 23: 4 Issues (2012)
Volume 22: 4 Issues (2011)
Volume 21: 4 Issues (2010)
Volume 20: 4 Issues (2009)
Volume 19: 4 Issues (2008)
Volume 18: 4 Issues (2007)
Volume 17: 4 Issues (2006)
Volume 16: 4 Issues (2005)
Volume 15: 4 Issues (2004)
Volume 14: 4 Issues (2003)
Volume 13: 4 Issues (2002)
Volume 12: 4 Issues (2001)
Volume 11: 4 Issues (2000)
Volume 10: 4 Issues (1999)
Volume 9: 4 Issues (1998)
Volume 8: 4 Issues (1997)
Volume 7: 4 Issues (1996)
Volume 6: 4 Issues (1995)
Volume 5: 4 Issues (1994)
Volume 4: 4 Issues (1993)
Volume 3: 4 Issues (1992)
Volume 2: 4 Issues (1991)
Volume 1: 2 Issues (1990)
View Complete Journal Contents Listing