A Lightweight Security Solution for Mitigation of Hatchetman Attack in RPL-based 6LoWPAN (2404.01689v1)
Abstract: In recent times, the Internet of Things (IoT) has a significant rise in industries, and we live in the era of Industry 4.0, where each device is connected to the Internet from small to big. These devices are AI enabled and are capable of perspective analytics. By 2023, it's anticipated that over 14 billion smart devices will be available on the Internet. These applications operate in a wireless environment where memory, power, and other resource limitations apply to the nodes. In addition, the conventional routing method is ineffective in networks with limited resource devices, lossy links, and slow data rates. Routing Protocol for Low Power and Lossy Networks (RPL), a new routing protocol for such networks, was proposed by the IETF's ROLL group. RPL operates in two modes: Storing and Non-Storing. In Storing mode, each node have the information to reach to other node. In Non-Storing mode, the routing information lies with the root node only. The attacker may exploit the Non-Storing feature of the RPL. When the root node transmits User Datagram Protocol~(UDP) or control message packet to the child nodes, the routing information is stored in the extended header of the IPv6 packet. The attacker may modify the address from the source routing header which leads to Denial of Service (DoS) attack. This attack is RPL specific which is known as Hatchetman attack. This paper shows significant degradation in terms of network performance when an attacker exploits this feature. We also propose a lightweight mitigation of Hatchetman attack using game theoretic approach to detect the Hatchetman attack in IoT.
- I. H. Khan and M. Javaid, “Role of internet of things (iot) in adoption of industry 4.0,” Journal of Industrial Integration and Management, p. 2150006, 2021.
- M. Hasan, “State of IoT 2022: Number of connected IoT devices growing 18% to 14.4 billion globally,” https://iot-analytics.com/number-connected-iot-devices/, 2022, [Online; accessed 25-May-2022].
- M. Sain, Y. J. Kang, and H. J. Lee, “Survey on security in Internet of Things: State of the art and challenges,” in 2017 19th International conference on advanced communication technology (ICACT). IEEE, 2017, pp. 699–704.
- L. Wallgren, S. Raza, and T. Voigt, “Routing attacks and countermeasures in the RPL-based internet of things,” International Journal of Distributed Sensor Networks, vol. 9, no. 8, p. 794326, 2013.
- C. Pu and T. Song, “Hatchetman attack: A denial of service attack against routing in low power and lossy networks,” in 2018 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2018 4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). IEEE, 2018, pp. 12–17.
- S. Oh, D. Hwang, K. Kim, and K.-H. Kim, “A hybrid mode to enhance the downward route performance in routing protocol for low power and lossy networks,” International Journal of Distributed Sensor Networks, vol. 14, no. 4, p. 1550147718772533, 2018.
- R. Kumar, J. Grover, G. Sharma, and A. Verma, “Addressing dio suppression attack in rpl based iot networks,” in International Conference on Information Security, Privacy and Digital Forensics. Springer, 2022, pp. 91–105.
- O. Gaddour and A. Koubâa, “RPL in a nutshell: A survey,” Computer Networks, vol. 56, no. 14, pp. 3163 – 3178, 2012.
- P. Thulasiraman and Y. Wang, “A lightweight trust-based security architecture for rpl in mobile iot networks,” in 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2019, pp. 1–6.
- G. Sharma, J. Grover, A. Verma, R. Kumar, and R. Lahre, “Analysis of hatchetman attack in rpl based iot networks,” in International Conference on Emerging Technologies in Computer Engineering. Springer, 2022, pp. 666–678.
- A.-u. Rehman, S. U. Rehman, and H. Raheem, “Sinkhole attacks in wireless sensor networks: A survey,” Wireless Personal Communications, vol. 106, pp. 2291–2313, 2019.
- W. Saad, Z. Han, M. Debbah, A. Hjorungnes, and T. Basar, “Coalitional game theory for communication networks,” Ieee signal processing magazine, vol. 26, no. 5, pp. 77–97, 2009.
- G. Sharma, J. Grover, and A. Verma, “Qsec-rpl: Detection of version number attacks in rpl based mobile iot using q-learning,” Ad Hoc Networks, vol. 142, p. 103118, 2023.