Visible to the public IDS To Detect Worst Parent Selection Attack In RPL-Based IoT Network

TitleIDS To Detect Worst Parent Selection Attack In RPL-Based IoT Network
Publication TypeConference Paper
Year of Publication2022
AuthorsKiran, Usha
Conference Name2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS)
Date PublishedJan
Keywords6LoWPAN, composability, Contiki-Cooja, IDS, Intrusion detection, IoT network, Linear programming, LLN, Ob-jective Function (MRHOF, Of0), performance evaluation, pubcrawl, resilience, Resiliency, Routing, routing attacks, Routing protocols, RPL network, simulation, System performance, Worst parent selection
Abstract

The most widely used protocol for routing across the 6LoWPAN stack is the Routing Protocol for Low Power and Lossy (RPL) Network. However, the RPL lacks adequate security solutions, resulting in numerous internal and external security vulnerabilities. There is still much research work left to uncover RPL's shortcomings. As a result, we first implement the worst parent selection (WPS) attack in this paper. Second, we offer an intrusion detection system (IDS) to identify the WPS attack. The WPS attack modifies the victim node's objective function, causing it to choose the worst node as its preferred parent. Consequently, the network does not achieve optimal convergence, and nodes form the loop; a lower rank node selects a higher rank node as a parent, effectively isolating many nodes from the network. In addition, we propose DWA-IDS as an IDS for detecting WPS attacks. We use the Contiki-cooja simulator for simulation purposes. According to the simulation results, the WPS attack reduces system performance by increasing packet transmission time. The DWA-IDS simulation results show that our IDS detects all malicious nodes that launch the WPS attack. The true positive rate of the proposed DWA-IDS is more than 95%, and the detection rate is 100%. We also deliberate the theoretical proof for the false-positive case as our DWA-IDS do not have any false-positive case. The overhead of DWA-IDS is modest enough to be set up with low-power and memory-constrained devices.

DOI10.1109/COMSNETS53615.2022.9668340
Citation Key9668340