Skip to main content

Investigating Vulnerabilities of Information Solicitation Process in RPL-Based IoT Networks

  • Conference paper
  • First Online:
Evolution in Computational Intelligence (FICTA 2023)

Abstract

The Routing Over Low power and Lossy network (ROLL) working group of IETF proposed the IPv6 Routing Protocol over Low Power and Lossy network (RPL) to fulfill multiple traffic requirements of the Internet of Things (IoT) environments. RPL structures ubiquitous IoT networks in the form of Directed Acyclic Graphs (DAGs) that comprises basic sensor nodes (motes), motes with routing capability, and one or more root (sink) nodes. RPL ensures optimal topological organization of IoT networks by its rank and version number properties. However, vulnerabilities in the RPL routing process pose threats to several protocol violations in the IoT environment. In RPL, information solicitation is the process by which sensor nodes seek network configuration information required to join an IoT network. The paper investigates the vulnerabilities associated with the information solicitation process in RPL-based IoT networks that leads to flooding of control messages. Consequently, there is energy and queue buffer depletion of sensor nodes in IoT networks. On the one hand, queue buffer depletion may lead to the dropping of packets by sensor nodes. On the other hand, energy depletion of sensor nodes may altogether make them non-functioning. Therefore, IoT network administrators must pay attention to the device’s power consumption. Recent research focuses on energy depletion due flooding of control packets. Nevertheless, flooding also affects other significant parameters like, the network convergence time, beacon interval and packet arrival rate. In this work, we perform an in-depth evaluation of the performance of RPL-based IoT networks under the threat of vulnerabilities associated with information solicitation process. The results of our analysis will assist in devising mitigation mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J.P., Alexander, R.: RPL: IPv6 Routing Protocol for Low-power and Lossy Networks (2012)

    Google Scholar 

  2. Raoof, A., Matrawy, A., Lung, C.H.: Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Commun. Surv. Tutorials 21(2), 1582–606 (2018)

    Article  Google Scholar 

  3. Sahay, R., Geethakumari, G., Modugu, K.: Attack graph-based vulnerability assessment of rank property in RPL-6LOWPAN in IoT. In: 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), pp. 308–313. IEEE (2018)

    Google Scholar 

  4. Hkiri, A., Karmani, M., Machhout, M.: The routing protocol for low power and lossy networks (RPL) under attack simulation and analysis. In: 2022 5th International Conference on Advanced Systems and Emergent Technologies, pp. 143–148. IEEE (2022)

    Google Scholar 

  5. Aghaei, A., Torkestani, J.A., Kermajani, H., Karimi, A.: LA-Trickle: a novel algorithm to reduce the convergence time of the wireless sensor networks. Comput. Netw. 4(196), 108241 (2021)

    Google Scholar 

  6. Rajasekar, V.R., Rajkumar, S.: A study on impact of DIS flooding attack on RPL-based 6LowPAN network. Microprocess. Microsyst. 1(94), 104675 (2022)

    Google Scholar 

  7. Kalita, A., Brighente, A., Khatua, M., Conti, M.: Effect of DIS attack on 6TiSCH network formation. IEEE Commun. Lett. 26(5), 1190–1193 (2022)

    Google Scholar 

  8. Bokka, R., Sadasivam, T.: DIS flooding attack impact on the performance of RPL based Internet of Things networks: analysis. In: 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC), pp. 1017–1022. IEEE (2021)

    Google Scholar 

  9. Medjek, F., Tandjaoui, D., Djedjig, N., Romdhani, I.: Multicast DIS attack mitigation in RPL-based IoT-LLNs. J. Inf. Secur. Appl. 1(61), 102939 (2021)

    Google Scholar 

  10. Mangelkar, S., Dhage, S.N., Nimkar, A.V.: A comparative study on RPL attacks and security solutions. In: 2017 International Conference on Intelligent Computing and Control (I2C2), pp. 1–6. IEEE (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rashmi Sahay .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sahay, R., Sushant, C.G. (2023). Investigating Vulnerabilities of Information Solicitation Process in RPL-Based IoT Networks. In: Bhateja, V., Yang, XS., Ferreira, M.C., Sengar, S.S., Travieso-Gonzalez, C.M. (eds) Evolution in Computational Intelligence. FICTA 2023. Smart Innovation, Systems and Technologies, vol 370. Springer, Singapore. https://doi.org/10.1007/978-981-99-6702-5_54

Download citation

Publish with us

Policies and ethics