Violettas 2021
Violettas 2021
article info a b s t r a c t
Article history: Internet of Things (IoT) constitutes a pivotal contributor to the Industry 4.0 (I 4.0) vision, tech-
Received 11 February 2021 nologically transforming production and societies. It enables novel services through the seamless
Received in revised form 3 June 2021 integration of devices, such as motes carrying sensors, with the Internet. However, the broad adoption
Accepted 10 July 2021
of IoT technologies is facing security issues due to the direct access to the devices from the Internet,
Available online 17 July 2021
the broadcasting nature of the wireless media, and the potential unattended operation of relevant
Keywords: deployments. In particular, the Routing over Low Power and Lossy Networks (RPL) protocol, a
Internet of Things prominent IoT solution, is vulnerable to a large number of attacks, both of general-purpose and
RPL protocol RPL-specific nature, while the resource-constraints of the corresponding devices are making attack
RPL attacks mitigation even more challenging, e.g., in terms of involved control overhead and detection accuracy.
IoT security In this paper, we introduce ASSET, a novel Intrusion Detection System (IDS) for RPL with diverse
Intrusion Detection System profiles to tackle the above issues that mitigate at least 13 attacks. At the same time, other solutions
go up to eight. ASSET, inspired by the network softwarization paradigm, supports a novel, extendable
workflow, bringing together three anomaly-detection and four RPL specification-based mechanisms,
a novel attacker identification process, as well as multiple attack mitigation strategies. Our IDS also
supports an adaptable control & monitoring protocol, trading overhead for accuracy, depending on the
network conditions. The proof-of-concept experiments show that ASSET entails a low overhead for the
different modes of operation it supports (i.e., 6.28 percent on average) compared to other solutions
reaching up to 30 percent. At the same time, it also keeps the power consumption at acceptable levels
(from 0.18 up to 1.54 percent more). Moreover, it provides 100 percent accuracy for specific attacks
and can identify the attacker in far more attacks than any other similar solution.
© 2021 Elsevier B.V. All rights reserved.
https://doi.org/10.1016/j.future.2021.07.013
0167-739X/© 2021 Elsevier B.V. All rights reserved.
G. Violettas, G. Simoglou, S. Petridou et al. Future Generation Computer Systems 125 (2021) 698–714
Directed Acyclic Graph (DODAG), upon which nodes’ communi- 1.2. Contribution
cation is based, affecting network’s performance in respect to
packet losses and end-to-end (E2E) delays. Passive attacks that Along these lines, we introduce ASSET, a softwarized Intrusion
monitor and intercept network traffic, e.g., sniffing, traffic analy- Detection System that offers a holistic approach to shield an
sis, are not part of the paper’s scope since they do not exclusively RPL-based IoT network against different types of attacks. Our
concern RPL. system is inspired by the Software-Defined Networking (SDN)
In fact, some attacks have no significant impact as standalone paradigm, i.e., it transfers functionality from the constraint end-
events, but they can be critically detrimental to the network in nodes to central premises, i.e., the Controller, offloading both
conjunction with others. Indicatively, impersonation attacks leave computational and communication overhead. At the same time,
space for malicious activities to originate inside the network, it follows a modular architecture that allows adaptations.
against which encryption is not a suitable solution [7] because, In particular, ASSET offers a novel workflow hosting well-
for example, an insider attacker getting access to symmetric keys known mechanisms for data analysis, e.g., the K-Means algorithm,
bypasses the applied RPL security mechanisms. Authenticated that can efficiently collaborate in data exchange toward detecting
security could be a solution, but RPL RFC [2] does not specify several attacks and multiple intruders in the network. The chal-
any mechanisms for public key cryptography [8], which possibly lenging point is that we managed to appropriately synthesize a
cannot be supported by constrained nodes [9]. Hash schemes framework of independent components that are not merely put
have been used for topology authentication without being able one next to the other, but they work as an integrated whole.
to mitigate rank-replay attacks [10]. Moreover, ASSET’s workflow provides the background for further
On the protocol bulletproofing front, the RPL standard [2] enhancements and extensions regarding detection or mitigation
specifies three modes of operation, i.e., unsecured mode, pre- of attacks.
installed mode, and authenticated mode. At the same time, it Next, we experiment with a minimum set of mechanisms for
also defines mechanisms for data confidentially and authenticity, anomaly and RPL specification-based detection, able to address
and replay protection [11,12]. Nevertheless, up to this time, RPL as many as 13 different types of RPL-related attacks with high
implementations on the most commonly used operating systems accuracy and moderated cost. We exploit our literature review
(e.g., Contiki OS and TinyOS) assume the unsecured mode of oper- findings showing that combining detection methods as well as
ation, putting aside RPL’s security features, which are essentially placement strategies brings advantages to the system [14]. In
characterized as optional. Authors in [11,13] elaborate on a partial particular, ASSET hosts three anomaly detection methods on the
implementation of such features, while according to [8], future node and/or on the Controller-level to provide the alternatives of
versions of RPL will address such issues as authenticated security. a lightweight and a computationally-intensive solution, and four
Until then, a suitable approach to encounter malicious ac-
specification-based ones.
tivities is the Intrusion Detection Systems (IDSs) [6,7,12]. IDSs
Most importantly, we develop an adaptable control & monitor-
refer to a set of methods designed toward: (i) detecting an attack,
ing protocol enabling centralized network supervision. In practice,
(ii) identifying the attacker, and (iii) mitigating the event. They
the protocol offers: (i) monitoring of RPL-related data, like UDP
aim to detect several attacks concurrently, and ideally, they can
packets or ICMP statistics in an adaptable fashion, i.e., trading the
be extended to deal with attacks that are not originally included
amount of communicating information for control overhead in re-
in their design goals. Compared to the standalone mechanisms,
spect to the network’s conditions; (ii) configuring RPL parameters
they require some degree of collaboration among the network’s
on-the-fly as a means of enforcing centralized decisions to the
nodes [12].
network nodes once a mitigation action should be taken; and (iii)
Regarding the RPL security, the design, development, and eval-
communicating node-level anomaly detection events that should
uation of an IDS should satisfy a set of requirements that reflect
trigger further investigation centrally, e.g., detailed monitoring
the solution’s width and depth. We define the metrics of robust-
by the Controller. To achieve adaptability, we define three modes
ness and extendability for quantitative evaluation (width), refer-
ring to the range over which the impact of an IDS can be spread of the protocol’s operation, i.e., slim-mode that offers ‘‘baseline’’
with respect to the number of attacks detected. Furthermore, monitoring at regular periods, essential-mode that indicates the
given that new attacks and security issues emerge following the first level of surveillance due to detected anomalies in more
IoT research’s progress, IDSs should be developed as a set of than three nodes, and full-function-mode that denotes the need
software components (mechanisms) to be quickly and on-the-fly of intensive surveillance due to detected anomalies that require
modifiable to encounter attacks beyond their initial scope. detailed data from IoT nodes.
Moreover, we define the metrics of accuracy and mitigation Novelties of ASSET could be summarized as follows: (i) de-
time for qualitative evaluation (depth). In fact, an IDS should tection and mitigation have been automated since all the mech-
exhibit a high accuracy rate regarding both the event and the ad- anisms are incorporated under the umbrella of one workflow,
versary; this means that the system does not misinterpret normal orchestrated by the central controller; (ii) existing node-level
events or nodes’ behavior as attacks or attackers, respectively, features became centralized to offer a better balance and re-
while minimizing the cases that attacks or intruders are over- sponse capabilities; (iii) node-level features are programmable,
taken. Once an attack/attacker has been detected, a mitigation with some addressing several attacks, providing a holistic view;
strategy should be employed to rapidly handle the malicious (iv) the modular architecture makes it easy to add new features
nodes and restore the network’s operation. or alter existing ones; (v) it can be easily deployed over any kind
The research field of IDSs in the IoT domain is generally vast. of RPL network, anywhere in the central infrastructure, by only
Still, only a restricted subset of them is appropriate for Low- materializing the connection with the sink node; (vi) the bespoke
power and Lossy Networks (LLNs) [14,15], i.e., they take into fully parameterizable GUI provided, makes it a powerful tool in
consideration limitations regarding their lossy links, heteroge- the hands of network administrators.
neous and resource-constrained devices. In fact, most of them The rest of the paper is outlined as follows. We briefly present
have been proposed in the recent bibliography, i.e., from 2013 the RPL protocol and the attacks associated with it in Section 2. In
to 2020 [6,12,14]. An overview of these works makes clear that Section 3 we elaborate on the proposed system, including details
there is no one-for-all solution that succeeds in all three axes, of its architecture, interfaces, and mechanisms. Our evaluation
i.e., to detect several attacks at once, to identify the intruder, and results are illustrated and discussed in Section 4. Related IDSs
to mitigate the event, and at the same time, meet the aforemen- along with a comparative overview are presented in Section 5,
tioned requirements of robustness, extendability, high accuracy and while conclusions along with further-step ideas are summarized
rapid mitigation. in the final section.
699
G. Violettas, G. Simoglou, S. Petridou et al. Future Generation Computer Systems 125 (2021) 698–714
2.1. RPL protocol Routing in the RPL networks is challenging due to the re-
source constraints of the connected devices. Moreover, such net-
Our work elaborates on the RPL protocol [2] since it is the works support dynamic topologies and are based on the wireless
state-of-the-art routing protocol for LLNs. RPL is a distance-vector medium’s passive nature. Consequently, they attract malicious
IPv6 protocol operating over the 6LoWPAN (IPv6 over Low-Power actions, including but not limited to denial of service attacks
Wireless Personal Area Networks) protocol stack where each (DoS), physical damages, and/or extraction of sensitive informa-
node builds the so-called DODAG to maintain an updated net- tion, e.g., DODAG version, nodes’ rank values, and nodes’ IDs.
work topology [4,5]. RPL primarily supports multipoint-to-point In fact, legitimate nodes can be compromised by exploiting the
communications, i.e., from the leaf-nodes upwards to the sink- RPL mechanisms themselves. Suppose a compromised node is
node(s), which operates as a border router connecting the LLN located near the sink. In that case, a combination of attacks can be
with fixed infrastructure, e.g., via a serial connection. launched with severe effects, spanning from resource-depletion
RPL constructs the DODAG by utilizing an Objective Function of nodes, due to a sharp increase in the control overhead, to
(OF), which evaluates the different possible pathways from every delays in data delivery, owing to graph repairs.
node to the sink by solving a multi-variable, multi-objective A. Raoof et al. [12] provide an interesting classification of the
optimization problem for routes’ discovery. The default Minimum attacks that are due to the WSN (Wireless Sensor Networks)
Rank with Hysteresis Objective Function (MRHOF) [16] considers inherited features and those designed to explicitly exploit the
the number of hops to the sink-node and/or the quality of each protocol’s mechanisms or vulnerabilities. Along these lines, we
link between participating nodes into the above pathway(s) by briefly present a comprehensive list of the most common and
utilizing the Expected Transition Count (ETX) metric. Other more disrupting attacks on the RPL protocol in the light of their origin
sophisticated OFs are also described in the bibliography [17]. rather than their impact, e.g., Sinkhole attack can degrade the
To avoid DODAG loops, RPL assigns each node a rank value quality of service in the network and eventually results in DoS
related to the rank of the attached parent-node and the distance to some parts of it [12].
from the sink. A node can be (re-)attached to the graph with a In RPL networks, similarly to the WSNs, topology exploitation
lower rank than its current one upon discovering a new preferred is an obvious starting point of malicious actions since pack-
parent. The opposite case (an updated greater rank) triggers a
ets’ routing depends on the DODAG. Typical routing disruption
Global Repair self-healing mechanism, i.e., recalculating ranks
attacks, such as Wormhole [15,20,21], Blackhole [15,22], and Selec-
for all network nodes [18], to avoid count-to-infinity problems.
tive Forwarding [15,23] (also known as Grayhole), cause network
Moreover, a node resets its rank and re-solicit neighbors (i.e., Lo-
traffic loss, topology inconsistencies, and significant delays since
cal Repair) once it loses its parent, i.e., without waiting for the
parts of the network can get disconnected. A malicious node may
whole network to reset [19]. To avoid exploitation of the above
either drop packets (completely or partially) or alter its standard
mechanisms that cause overhead and delays, RPL RFC [2] suggests
routes once it gains an important position in the graph, e.g., a
a maximum threshold per hour for the repairs.
parent-node with many other nodes attached.
RPL’s RFC [2] also defines four ICMPv6 (Internet Control Mes-
Other typical network attacks, like Flooding [24], Replay [25]
sage Protocol) messages for information exchange and facilitating
or Neighbor [24] attacks, execute repetitive or falsified message-
the DODAG construction. The DIO (DODAG Information Object)
sending in order to deceive their victims and introduce incon-
message is first fired by the sink, multicasted and populated
sistencies. This subtle manipulation can yield severe topology
downwards until all reachable nodes receive it. Among others, it
issues and excessive energy consumption, especially in dynamic
includes timer settings, DODAG version, and mode of operation
(storing/non-storing). DAO (Destination Advertisement Object) networks with mobile nodes [26]. Unlike Replay attacks in WSNs,
messages travel upward, advertising each node’s ancestor until which are performed with data packets, in RPL, the idea is to
reaching the sink. The same information (node–ancestor pair) record legitimate control messages and forward them later.
is also stored by each node the DAO went through. This way, Impersonation attacks, such as Clone-ID [6], or the more so-
each node maintains a version of the DODAG. DIS (DODAG In- phisticated Sybil [23] attack, are originated from a malicious
formation Solicitation) is a unicast message beaconed period- node embezzling the identity(ies) of one or several legitimate(s)
ically by a parentless node to solicit potential parents in its node(s). The goals vary from disrupting the routing topology to
radio-coverage vicinity. DAO-ACK is an optional message for DAO submitting forged data in the network or deceiving/manipulating
acknowledgment that is usually omitted since it causes heavy a reputation-based/voting-based system. These types of attacks
overhead. need a centralized authority to be tackled successfully [27].
As the fundamental pillar of RRL, the DODAG needs to be Besides the above, several attacks exploit specific RPL features,
updated and maintained frequently. A dedicated algorithm—the such as the rank and version fields of control messages, the proto-
Trickle Timer—handles the frequency of DIO messages, upon which col’s self-healing mechanisms, or operation modes. Rank attacks
the graph’s convergence time is based. The algorithm balances include: (i) Decreased Rank [28] or Sinkhole [23] attack, where the
preserving the node’s power consumption and keeping the net- malicious node advertises a low-rank value to force all neigh-
work information up-to-date and trustworthy. To achieve this boring nodes to select it as a parent; (ii) Increased Rank [29,30]
trade-off, DIO messages dispatching frequency varies from a attack, where an adversary near to the sink advertises a high-rank
few seconds, up to 17.5 min, since the Trickle Timer’s duration value to compel all neighboring nodes to avoid it and eventually
is doubled each time it fires [5]. Any change in the DODAG, sub-optimize their parent choice; and (iii) Worst Parent [30]
e.g., unreachable parent, DIO or DAO mismatch, or new parent attack, where the adversary intentionally makes the worst par-
selection, causes a Trickle Timer Reset for the particular node. As ent selection for itself to forward the received packets via non-
a result, DIO messages are dispatched at a higher rate when the optimal paths. Eventually, an attacker can powerfully reshape
network is unstable and at a slower rate otherwise, preserving the topology to diverge from the optimum one [31] with sub-
energy and reducing network traffic. sequences regarding increased traffic, high energy consumption,
DODAG, as well as the RPL messages and mechanisms, are the packet delay, and even routing loops.
origin of the so-called RPL-related attacks described in the next DODAG inconsistencies are an ordinary situation that is nor-
section. mally addressed by the protocol’s self-healing mechanisms as a
700
G. Violettas, G. Simoglou, S. Petridou et al. Future Generation Computer Systems 125 (2021) 698–714
701
G. Violettas, G. Simoglou, S. Petridou et al. Future Generation Computer Systems 125 (2021) 698–714
i.e., retrieving data communication statistics from the sink or can configure and enable this mode when certain criteria are met
the nodes, respectively. The RPL control engine is responsible (a given number of nodes detect an anomaly).
for enforcing particular RPL configuration processes and receiv- We now describe in detail the messages exchanged between
ing node-level anomaly detection events from the nodes. The the Controller and the nodes. In Table 1, we enlist all messages,
data communication statistics and the anomaly detection events and their design primitives, supported by the Southbound In-
are being communicated to the Application Plane through the terface and its corresponding network control and monitoring
Northbound Interface for further actions. Furthermore, the Control protocol. The last column depicts the specific mode they are
Plane maintains a real-time network representation based on the utilized with (i.e., slim, essential, full-function).
Graphstream library [40,42]. In RPL, nodes collect information about their neighbors (i.e.,
The Application Plane provides the GUI and configuration as- nodes within the wireless radio coverage) and nominate a pre-
pects of the IDS. It supports a real-time visualization of the IoT ferred parent within time instances specified by the Trickle Timer
topology, which also designates potential IoT nodes acting as algorithm. This way, a network graph, i.e., the DODAG, is con-
attackers. Furthermore, it provides handles to the administrator structed in a distributed manner. Since this information is local,
for management and configuration aspects of the IoT network we implemented a notification feature in every node triggered
and the intrusion detection process. Finally, it is responsible for by any parent-change event. In such a case, the node transmits
the data analysis tasks of the Controller, including controller-level a message to the Controller indicating the latest chosen parent
anomaly detection algorithms, specification-based detection mech- with its rank, i.e., a [NP] message. Consequently, the Controller
anisms, classification algorithms for the attacker identification, as is aware of all nodes’ current parent and can form the topology
well as a counter-measures engine, being responsible for triggering graph. Alternatively, the Controller may proactively request the
attack mitigation processes, as a result of the data analysis. node’s parent information if such information is missing through
We now move on to discussing ASSET’s interfaces. Since the a [SP] message. Slim-mode uses these two messages only.
Northbound Interface is an internal interface of the Controller, Other messages from nodes to the Controller include the [IS],
we mainly focus on the Southbound Interface, which is essential [NR], and [NN], communicating ICMP statistics (e.g., total sent and
for the performance of ASSET, especially towards reducing the received messages), node’s current rank, and available neighbors
involved control overhead. with their ranks, respectively. Whenever a node detects an outlier
in its ICMP statistics, it dispatches an [AD] message. Further-
3.1.1. The Southbound Interface more, the [VN] and [RN] messages inform the Controller for a
The Southbound Interface utilizes a lightweight application- DODAG Inconsistency or Local Repair attack, detected by a node,
level protocol that allows the Controller to communicate with the respectively.
nodes via the sink. The protocol maintains compatibility with the The Controller uses designated messages to: (i) solicit missing
RPL standard while being flexible to incorporate new features, node’s parent or node’s neighbors’ information with [SP] and [SN]
such as a novel mechanism for mitigating a newly discovered messages, respectively; (ii) enable or disable ICMP statistics, and
attack. It supports either pulling of information, i.e., the Controller neighbor information notifications with [EI] and [NL] messages,
retrieving monitoring information or configuration parameters respectively; and (iii) implement actions to mitigate attacks, in-
from nodes, or pushing information, i.e., the nodes notify the cluding disabling Trickle Timer resets with [TT], blacklisting a
Controller regarding their monitored data periodically. The im- node from becoming a parent with [BL], and disable Local and
plemented protocol configuration hooks [4,5,37], based on the Global Repair features with [LR] and [GR] messages, respectively.
relevant interfaces implemented in the context of the WiSHFUL Consequently, the Southbound Interface enables novel ASSET
project (i.e., called UPIs), enable the Controller to act as a cen- capabilities, i.e., balancing control overhead to given network
tralized network control facility, especially for enforcing attack conditions and the support of multiple intrusion detection fea-
mitigation measures. tures.
The Southbound Interface is responsible for the following as- In the following subsections, we elaborate on the intrusion
pects: (i) monitoring nodes on the statistics of packets exchanged detection workflow of ASSET and its corresponding mechanisms
and RPL behavior, with different levels of accuracy and com- for attack detection, attacker identification, and attack mitigation.
munication overhead, depending on the criticality of network
conditions; (ii) enforcing changes in RPL protocol behavior of 3.2. Intrusion detection workflow
nodes to mitigate an attack; and (iii) communicating node-level
anomaly (or specification-based) detection events—from nodes to ASSET operates over the Controller and the IoT nodes inter-
the Controller—for triggering further actions. In practical terms, changeably, as depicted in Fig. 2, offloading processes tradition-
the interface operates in three different modes, i.e., slim-mode, ally handled by the nodes to a centralized Controller, for a better
essential-mode, and full-function-mode, described as follows: intrusion detection accuracy and resource efficiency.
(1) In slim-mode, ASSET operates with the minimum number of When the network runs stably, in terms of ICMP and data
monitoring messages, being essential to construct the complete traffic behavior, the Controller collects only the active topolog-
graph of the network centrally. Either the Controller requests ical structure (i.e., slim-mode). In parallel, the nodes perform
the parent of a node, or the nodes are periodically reporting all anomaly detection based on their own measured ICMP statistics.
parent changes. This mode is in place in networks without attack In case they detect one or more outliers, they enable the essential-
indications. mode of the Southbound Interface, i.e., start communicating the
(2) In essential-mode, the nodes transmit to the Controller— ICMP statistics to the Controller. Both nodes and Controller com-
besides the slim-mode notifications—periodic ICMP statistics, plementarily support RPL specification-based attack detection,
which enable controller-level anomaly detection. This mode is like monitoring the number of recent local topology repairs and
enabled when a node detects an attack through its node-level DODAG inconsistencies.
anomaly detection process. The Controller performs anomaly detection on data statistics to
(3) In full-function-mode, the nodes complement the previ- detect Blackhole and Grayhole attacks. Furthermore, it may utilize
ous modes with additional information, i.e., the node’s rank and the full-function-mode to request additional information, such
neighbors information for ASSET to detect—among others—Rank as the node’s rank and its neighbors with their corresponding
and Sybil attacks with higher precision. The ASSET administrator ranks to detect a Decreased Rank attack by comparing the rank
702
G. Violettas, G. Simoglou, S. Petridou et al. Future Generation Computer Systems 125 (2021) 698–714
Table 1
Messages exchanged between the Controller and the nodes.
ID MESSAGE FORMAT DESCRIPTION M
NP [IPv6][IPv6][int] Node’s current parent S
IS [IPv6][int] ICMP statistics
Nodes initiated AD [IPv6][boolean] Anomaly detection notification
E
VN [IPv6][boolean] Version attack notification
RN [IPv6][boolean] Local Repair attack notification
NR [IPv6][int] Nodes’ current rank
F
NN [IPv6][IPv6 neighbors][list] Available neighbors and their ranks
SP [IPv6][int] Requests the node’s parent S
SN [IPv6][list] Solicits node’s neighbors information
EI [IPv6 or multicast][boolean] Enable/Disable ICMP notifications
Controller initiated TT [IPv6 or multicast][boolean] Enable/Disable Trickle Timer reset
BL [IPv6][boolean] Node blacklisted (Y/N) E
LR [IPv6 or multicast][boolean] Enable/Disable Local Repair
GR [IPv6 or multicast][boolean] Enable/Disable Global Repair
SN [IPv6][list] Solicits node’s neighbors information
F
NL [IPv6 or multicast][boolean] Enable/Disable neighbors information
(type I error) that is a function of the selected confidence level. an abnormal RPL status, in case they are crossed. At this point,
For example, probabilities p = 0.01, 0.05, and 0.10, correspond to ASSET supports four specification-based mechanisms (i.e., Rank
CLs of 99, 95 and 90 percent, since CL = (1 − p) ∗ 100, named as Validation, Node ID Validation, Fixed Threshold F and Adaptable
confidence values q99, q95, q90, respectively. The test’s sensitiv- Threshold λ based detection), which brief description follows.
ity can be adjusted by altering the size N of data (i.e., w size), along A Decreased Rank attack is detected upon discrepancies of
with the probability p of Type I error (or confidence level, CL). nodes’ and nodes’ parents’ advertised rank via [NR] messages.
Dixon-Q test is lightweight and easy to implement for resource-
More specifically, according to an algorithm introduced in [35],
constrained devices since it only needs a couple of subtractions
if a node’s rank, plus the RPL stabilizing parameter MinHopRank-
and one division with every two newly arrived samples. For
Increase [2] is lower than its parent’s rank, then the latter is
example, if the samples are 3-digit, the total added complexity
considered as an attacker. We also monitor all advertised ranks
is Θ (3) + O(M(3))log3, which associates with negligible overhead
for resource-constrained devices. Each time an outlier is detected, to be higher than the sink’s rank plus the MinHopRankIncrease.
it is communicated to the Controller through the Southbound Furthermore, the Controller detects a Clone-ID attack via a mech-
Interface as an ‘‘orange’’ alert to trigger further intrusion detection anism named Node ID Validation (∆) to detect two nodes with the
actions, such as a Controller-level anomaly detection process. same ID.
The Controller can implement more resource-consuming at- At this point of the investigation, ASSET uses configurable fixed
tack detection approaches than the nodes, however with addi- thresholds F to monitor crucial parameters at the Controller or
tional control overhead, i.e., the IDS switches to essential-mode, node level, including the number of triggered Local and Global
allowing for a global view of the network, to investigate anoma- Repairs , and Trickle Timer Resets; whenever they exceed the
lies both in the control and data traffic. Regarding the control particular thresholds, the Controller is notified for further attack
traffic, the relevant process is enabled whenever Dixon-Q detects detection actions.
an anomaly in the neighborhood of one or more nodes. ASSET Furthermore, we apply an adaptable threshold λ, which we
currently employs Chebyshev’s inequality [47], acting as a more
elaborate on here. Several attacks relate to fabricated control
accurate but also complex example, compared to Dixon-Q.
messages causing RPL performance issues. For example, the sink-
When the data distribution is unknown, Chebyshev’s inequal-
node avoids routing loops and topology inconsistencies by in-
ity theorem guarantees that at least 1 − K12 of data from a
creasing the DODAG version whenever a global topology repair
sample fall within K standard deviations from the mean. This can
be the basis of an outlier detection method [47] by calculating occurs. Intruders can inject continuously increasing DODAG ver-
relevant lower or upper outlier detection value (ODV) limits. Any sions into DIO messages they dispatch, causing the receiving
data value outside these limits is considered to be an outlier. nodes to reset their Trickle Timer, implement local topology re-
For calculating the ODV limits, there is a need to define a p1 pairs, and consequently face increased communication overhead.
threshold, trimming a small percentage of extreme values at the The protocol reduces the effects of such attacks by limiting the
beginning of the outlier detection process, so outliers do not bias number of Trickle Timer Resets based on a fixed RPL threshold
the standard deviation calculation. Indicative p1 values are 0.01, with the value 20. Any malformed packets, i.e., with the ‘R’ flag
0.05, or 0.10. Additionally, a second p2 threshold represents the IPv6 header option set, upon reaching this threshold, are being
expected probability of an outlier appearance. The p2 threshold is dropped by the receiving node without triggering Trickle Timer
used to determine outliers, and is usually lower than p1 , taking Resets.
values like 10−2 , 10−3 , 10−4 . Both p1 and p2 control the outlier Here, we utilize the adaptable λ(r) threshold function intro-
detection process’s sensitivity and determine the k values for
duced in [32], which is more effective than RPL’s fixed threshold
the outlier pre-filtering (first phase) and actual outlier detection
in terms of reacting to varying attack patterns. We use a fixed
(second phase) processes, respectively.
threshold F at the node-level in practice, while we introduced
Regarding the detection of anomalies in data traffic (Blackhole
a centralized variation of the above algorithm ∑ at the controller-
or Grayhole attacks), ASSET monitors data packet reception based n i
Epkts
level, as λ(r) = [α + β · e1−γ ·r ], where r = ∑n , α = 5, n is
i =1
on the K-means algorithm [48] implemented in Weka library [39]. i
i=1 Dpkts
Given n measurements of nodes to be clustered, a distance mea-
sure d to capture their dissimilarity, and the number of clusters to the number of nodes communicating packets, Epkts the number of
be created (i.e., k = 2 in our case), the algorithm initially selects received packets with ‘R’ flag set true, Dpkts the total number of
k random points as the clusters’ centers. It assigns the rest of packets received. The β is chosen to lead to a default λ(r) value
the n − k points to the closest cluster center (according to d). of 20 (i.e., as suggested by RPL RFC [2]) and α ensures that λ(r)
Then, within each of these k clusters, the cluster representative cannot be zero. The value of γ , according to the authors, should
(also known as centroid or mean) is computed. The process con- be 20 < γ < 25, i.e., we set it to value 22 in our case. Such
tinues iteratively with these representatives as the new clusters’ centralized variation brings the advantage of having a λ value
centers until convergence. Although this is an NP-hard problem, characterizing the whole topology, so a local attack incident leads
it is simplified by heuristic algorithms to converge to a local to the corresponding protection of all nodes in the network.
optimum [49]. In our case, the adaptable threshold λ appears more con-
Next, we describe the specification-based mechanisms of the
servative compared to the one introduced in [32], since the r
Controller.
value reduces with the topology size. However, it produces ex-
cellent results in the particular experiments we carried out. A
3.3.2. Specification-based detection
possible improvement could be a normalization of the equation
To highlight the extendability benefits of ASSET, we introduce
basic building blocks that can form alternative RPL specification- concerning the number of nodes.
based detection methods, including: (i) RPL subsystem or param- In a similar way, other mechanisms monitoring particular RPL
eter monitoring, which relates to ASSET following the behavior of subsystems or parameters and applying thresholds could be im-
RPL, reflected to particular parameters, through the Southbound plemented to detect additional attacks. Right below, we proceed
interface, e.g., number of Trickle Timer Resets, nodes’ rank values, with the description of our attacker identification mechanism
etc; and (ii) a number of fixed or adaptable thresholds, indicating introduced here.
704
G. Violettas, G. Simoglou, S. Petridou et al. Future Generation Computer Systems 125 (2021) 698–714
Table 2
Attacks and designated actions supported by the IDS.
Categories Description and effects of the attack(s) DM PS DI IA AM
Topology exploitation Cause traffic loss, topology inconsistencies or significant delays
Blackhole Messages to be forwarded are dropped K C U Y B
Grayhole Messages to be forwarded are selectively dropped K C U Y B
Network attacks Capture control messages and forward or replay them maliciously
Flooding All legitimate messages are replicated Di,Ch H I,U,R N G,L,P
Replay Specific control messages (i.e., DIO) are replicated Di,Ch H I,R N G,L,P
Neighbor Replicates control messages originated from a neighboring node Di,Ch H I,R N G,L,P
Impersonation attacks Steal the identity(ies) of one or more node(s)
Clone-ID / Sybil Pretends to be a ‘‘legitimate’’ node by confiscating its ID ∆ C I,R Y B
RPL specific attacks Exploit specific RPL features
Decreased Rank/Sinkhole Advertises a closer to the sink position than the real one Di,Ch,RV H I,R Y B
DODAG Inconsistency Applies an inconsistent DODAG which forces nodes to probe neighbors λ(C,n) H T,R N G,L,P
DODAG Version Increases DODAG version periodically, triggering resets of network probing timers λ(C,n) C T,R N G,L,P
Global Repair Resets routing tables and probes all nodes, i.e, to repair topology λ(C) C R N G
Local Repair Nodes reset their local routing tables, i.e., triggering neighbors’ probing λ(C),F(n) H T,R N L,P
DM: Detection Method - Anomaly Detection [(Di)ixon, (Ch)ebyshev, (K)-Means], Specification Based [Adaptable Threshold (λ(C:Controller, n:node)), Fixed Threshold
(F), Rank Validation (RV), Node ID Validation (∆)].
PS: Placement Strategy - (C)ontroller, (H)ybrid.
DI: Data Input - (I)CMP Statistics, (U)DP Statistics, (T)rickle Timer Resets Counter, (R)PL Control Messages.
IA: Identification of Attacker - Y/N.
AM: Attack Mitigation - (B)lacklist Node, I(G)nore Global Repairs, Stop (L)ocal Repairs, Sto(P) Trickle Timer Resets.
3.6. Summary
Table 3
Network setup parameters.
Parameter Value Notes
Network layer RPL Storing mode
MAC layer 802.15.4
Implementation Contiki 3.0 - Cooja
Sink node(s) 1 Serial Port Connection
Mote type Zolertia Z1
Nodes placement Random
Number of nodes 25 or 50
Area 800 m × 800 m
Simulated time 3 h 10,800,00 ms
Data (UDP) transmission 5 min Unless otherwise stated
period (P)
ICMP probing frequency 5 min Avoiding zero probings
Packet size 70 B Average size
TX range 50 m
Interference range 50 m
TX/RX success ratio 100%
Trickle timer duration 4 ms–17.5 min Contiki RPL defaults
Fig. 6. Control overhead over time for a combined Decreased Rank and Blackhole
attack on a network of 25 nodes.
4.2.4. Attacker’s identification all UDP data packets traveling towards the sink. In contrast, for
Our last proof-of-concept outcome elaborates on the attacker’s Grayhole the attacker decides to forward or not the received
identification mechanism. In Fig. 8, in a three-hour run, we op- data packet based on a fair coin toss. In Decreased Rank at-
erate another random, multi-hop topology (illustrated on the tack, a malicious node is advertising a fake rank calculated after
up-left part), where 25 nodes (the yellow ones) are under Black- subtracting four times the RPL’s parent switching threshold (Min-
hole attack by the purple node (ID = 27), while they route their HopRankIncrease) from the attacker’s actual rank (i.e., fake_rank
data packets to the sink (green node). The intruder is placed = actual_rank - 4*MinHopRankIncrease). For DODAG Version at-
within the direct reach of six nodes (ID 2, 6, 7, 10, 15, 18) and tack, an adversary keeps sending DIO messages with increasing
presents a legitimate behavior until 01:20 hour when it starts version numbers, triggering continuous Trickle Timer Resets, in
dropping all received data packets in their routing towards the addition to Global and Local Repairs. DODAG Inconsistency attack
sink (including the attacker’s own ones to make the scenario is applying erroneous headers in RPL messages [32] triggering
more challenging). also Trickle Timer Resets, Global and Local Repairs. Global or Local
In a network with scheduled UDPs and a pre-defined dispatch- Repair attacks, are replicated with a DODAG Inconsistency attack.
ing period, the impact of a Blackhole attack is to differentiate Flooding attack was implemented with the attacker continuously
affected by non-affected nodes in terms of the UDP packets num- dispatching forged RPL & data packets, limited by Cooja pro-
ber arrived at the sink. Indeed, the K-Means algorithm running cessing capabilities since a high communication load crashes
in the Controller has successfully divided the network into two the (emulated) serial port. We implemented the Replay attack
distinct groups, i.e., clusters 0 and 1 (bottom left window), also in a similar way to Flooding attack by assuming an adversary
illustrated in the right part of Fig. 8, i.e., cluster 0 contains the continuously re-sending the RPL messages it receives. Finally,
yellow nodes along with the sink (non-affected as indicated by the Clone-ID attacker duplicates existing RIME, MAC, and/or IPv6
the high number of UDP packets). In contrast, cluster 1 shown in addresses, i.e., leading to duplicated node IDs.
red, consists of the affected nodes (due to the low number of UDP The specific attack detection mechanism employed for each
packets). attack is also indicated in Table 5. Chebyshev’s inequality’s and
A closer look at the affected sub-graph reveals that only nodes Dixon’s settings are w size = 8, p1 = 0.95 and w size = 5,
6, 7, and 18 within the intruder’s coverage are affected by the confidence = q99, respectively. The configuration of threshold
attack. In contrast, the other three ones, i.e., 2, 10 and 15, are F was set to 10 (half of the one proposed by RPL, assuming a
not affected because they do not select the intruder as a parent hostile environment), and adaptable λ is implemented as defined
in Section 3.3.2. These mechanisms operate both on the node and
(indeed, the parent of the nodes 2,15 is node 26, while the parent
Controller side, depending on the attack type. K-Means confidence
of node 10 is node 23). Simultaneously, nodes 3, 13 and 5, 9, 17
was set to 0.1.
select as a parent the affected nodes 18 and 6, respectively, and
The central cells in Table 5 indicate the number of nodes
consequently are also influenced by the Blackhole attack, although
signaling an attack at the given time-slot, based on the mecha-
they are not within the intruder’s coverage.
nism referenced in the particular row. We indicate with bold the
At this step, it is crucial to distinguish among cluster members
time-slot that attacks start, e.g., we selected slot 16 on 80th min
to identify the malicious one. K-means feeds Kosaraju’s algorithm
for all different cases. We color differently the cells where the
with the red sub-graph. Kosaraju then defines one sub-graph (or
attacks are detected (gray) and mitigated (dark gray-white fonts),
more, in case of multiple attacks) and passes the graph to the
as well as those reflecting false positives (light gray). Single nodes
mother node algorithm. The algorithm recognizes node 27 as
cause a few false positives. As previously discussed, an event is
the ‘‘root’’ of this sub-graph, identifying this ID as the malicious
considered an attack when at least three nodes declare its detec-
node. In our simulation, the attack begins at 01:20 hour, and our
tion, except for Clone-ID and Global Repair attacks, because the
system recognizes the attacker at 01:47 hour. Right afterward, the
corresponding mechanisms do not cause false positives, e.g., the
Controller blacklists this node to not be selected as a parent node. Global Repair attack is being handled at the sink only. Moreover,
In this scenario, we noticed that leaving unmitigated such an regarding Decreased Rank detection, although four rank inconsis-
attack reduces the packets that the sink successfully received by tencies are reported in time-slot 18, the dedicated RV mechanism
as much as 17.3 percent. Our system helps the network lose only needs to mandate the nodes to enable full-function mode to send
5.7 percent of the packets that would eventually arrive at the sink all neighbor’s data (i.e., [SN] message) and compare all declared
in a non-attack case. ranks for discrepancies before identifying the attacker.
Next, we carry on discussing the results on the robustness of We consider an attack as mitigated when the proper mitiga-
ASSET. tion action is enforced, independently of the time it takes. An
indication of the latter appears in Table 5 through the declining
4.3. Robustness results number of nodes signaling the attack immediately after the miti-
gation time-slots. Once we described our notation, we proceeded
Our results regarding ASSET’s robustness are summarized in with our observations based on each row’s results.
Table 5 and show that our proposed system can handle 13 at- The first two rows consider simulations without attacks to
tacks. We excluded from our analysis Sinkhole, Neighbor, and highlight the overhead of ASSET during regular system operation.
Sybil attacks due to their high similarities with Decreased Rank, On the one hand, Chebyshev’s inequality did not produce any
Replay, and Clone-ID attacks, respectively. Moreover, Decreased false positives. However, we had some rare false positives with
Rank and DODAG Inconsistency attacks appear twice in the Table more relaxed confidence levels (e.g., p1 = 0.90) without trigger-
to highlight how alternative mechanisms can handle them. ing attack detection. On the other hand, the Dixon-Q test faces 5
Each row of Table 5 represents a three-hour simulation, di- cases of single-node detecting outliers, e.g., node 22nd on time-
vided into 5 min time-slots, regarding the same 25-nodes’ net- slots 23, 24, and 25. We also note that Dixon-Q detects some
work. The first two rows refer to Chebyshev’s and Dixon’s op- infrequent outliers even after an attack is mitigated since the
erations in case of non-attack. In contrast, each of the rest rows network settles down progressively. This causes a minor commu-
represents a type of attack (1st column), occurring at the 80th nication overhead increase in the particular nodes, i.e., enabling
min, along with the detection mechanism (2nd column) in place. the transmission of ICMP statistics to the Controller, and high-
Regarding basic implementation details and configurations, lights that ASSET’s control overhead adaptability aspects require
in Blackhole attack, the malicious node suspends forwarding of further investigations, which we consider as future work.
709
G. Violettas, G. Simoglou, S. Petridou et al. Future Generation Computer Systems 125 (2021) 698–714
Blackhole and Grayhole attacks impact data rather than control
packets. We employ the K-Means algorithm, which continuously
36
60
0
0
0
0
0
0
0
0
0
0
0
0
0
0
clusters the nodes into two groups based on their UDP packets
35
55
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
ets, i.e., assuming that the attack does not impact most nodes.
33
45
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
analysis.
Regarding the Decreased Rank attack, we provide results for
29
25
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
needs four time-slots until its mitigation time, while the latter
can detect the attack in just two time-slots. However, Cheby-
27
15
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
5
0
0
0
0
0
0
0
0
0
0
5
mechanisms.
0
1
0
4
0
0
0
0
0
0
0
1
0
0
0
1
1
2
0
0
0
0
0
0
0
0
0
0
0
0
5
1
0
0
0
0
0
0
0
0
0
0
0
0
4
1
2
0
0
0
0
0
0
2
0
0
10
12
40
0
1
2
0
5
0
0
0
1
0
0
11
35
0
0
1
0
5
0
0
0
1
1
0
9
15
16
16
12
30
0
0
0
0
4
1
1
5
7
1
15
16
11
25
0
0
0
0
0
2
0
1
2
0
1
paper’s scope.
We also provide the outcome of Chebyshev’s mechanism in
20
16
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
sitivity (e.g., p1 = 0.90 and the same w size) can detect the
attack at time-slot 20 and mitigate it at 21, i.e., later than the
λ: Adaptable Threshold, F: Fixed Threshold, RV: Rank Validation, ∆: Node ID Validation
13
0
0
0
0
0
0
0
0
0
0
0
0
0
0
5
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
It takes four time-slots for ASSET to mitigate both Flooding
25
5
0
0
0
0
0
0
0
0
0
0
0
0
0
0
and Replay attacks because of the gradual control traffic increase
among the nodes. One node detects an outlier for the Replay
20
4
0
0
0
0
1
0
0
0
0
0
0
0
0
0
attack at the 28th time-slot, which is ignored by the Controller.
15
3
0
0
0
0
0
0
0
0
0
0
0
0
0
0
C : Controller, n: node
Mitigation for both attacks involves disabling Global and Local
Repairs, as well as Trickle Timer Resets. Since Cooja faces stability
10
2
0
0
0
0
0
0
0
0
0
0
0
0
0
0
issues with these two attacks, conducting these experiments in a
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
5
λ(C ),F(n)
real network conditions is another open issue.
Time-slot
λ(C , n)
λ(C,n)
λ(C )
DM
RV
Ch
Ch
Ch
Ch
Ch
Di
∆
K
K
Clone-ID attackers are rapidly identified by the Controller with
100 percent accuracy, due to the centralized nature of ASSET,
Chebyshev’s Inequality
i.e., nodes with duplicated IDs are immediately detected and
Attack Mitigation
Attack Detection
Attack initiation
DODAG Inconsistency
DODAG Inconsistency
False Positives
black-listed. Sybil attacks will also be equivalently mitigated.
No Attack
Attack
Decreased Rank
Decreased Rank
DODAG Version
The above results demonstrate that ASSET, under the given
Dixon-Q Test
Global Repair
Local Repair
scenario, configuration settings and network conditions: (i) can
Blackhole
Grayhole
Table 5
Clone-ID
Flooding
Replay
detect 13 attacks (i.e., including Sinkhole, Neighbor, and Sybil
attacks that exhibit a very similar behavior with Decreased Rank,
710
G. Violettas, G. Simoglou, S. Petridou et al. Future Generation Computer Systems 125 (2021) 698–714
of them it mitigates the outcome of the attack, i.e., the attack may
still be present.
Due to our experiments’ high complexity, we consider a more In our survey paper published in 2021 [14], we have inves-
thorough investigation of ASSET’s performance, including its sta- tigated the 22 most recently introduced RPL-related IDSs in the
tistical evaluation and comparison with other similar solutions, as literature (2013 − 2020) and concluded the outcome that com-
future work. However, we argue that the current results suffice bining detection methods as well as placement strategies brings
to confirm ASSET’s novelties, as defined in the paper. positive results. The competetive advantage was found to be the
number of attacks the system detects; this ranges from three to
4.3.1. Open ASSET vulnerabilities five (3 to 5) for the hybrid detection systems [44,58] and goes up
Here, we discuss several ASSET’s security vulnerabilities that to eight (8) for the full hybrid ones [43,59]. Table 6 provides a
are outside the scope of this paper and deserve further investiga- brief comparative overview of hybrid systems, which are found
tion. These open challenges can be summarized as follows. the most advanced of the recent literature [14] and relevant to
For simplicity, we currently assume that ASSET Controller and our proposed one.
corresponding communication (e.g., packets carrying measure- Further benefits include the ability of some systems to iden-
ments from nodes to the Controller) is safe and not tampered. tify the attacker [57,59] and/or mitigate the attack [43,59], the
For example, attacks oriented to Software-Defined IoT solutions extendability as a feature that enables the IDS evolution towards
could be relevant to ASSET, e.g., targeting a centralized Controller.3 detecting new attacks, as well as the detection accuracy rate
Consequently, there is a need for hardening the related secu- in conjunction with low resource overhead, especially when the
rity. Several techniques could be potentially applied, including developed mechanisms are appropriately located both in central
Byzantine Fault Tolerance [54], n-versioning, or secure tokens and and distributed nodes.
enclaves. Moreover, a sophisticated attack could possibly tamper In particular, appropriately tuning the parameters of SVELTE
with the measurements traveling to the sink to ‘‘hide’’ an ongoing [43] can offer as much as 100 percent of detection accuracy and
attack or to work around an ASSET mechanism. This may be zero false positives. However, the system trades its advantages
challenging for ASSET since it operates many attack detection with resource requirements regarding storage, the signatures’
mechanisms in parallel, i.e., another one may detect the attack. repository, and computational power for anomaly detection algo-
We consider such aspects complementary with our solution but rithms. In comparison, Bostani et al. [57] show an average of 93.3
complicated enough to deserve an independent study. percent accuracy with less than 3.3 false positives for multiple
Furthermore, our proposal may be vulnerable to more sophis- runs.
ticated attacks than the considered ones. For example, neighbor- Game Theory IDS [58] reports an average of 98.6 percent ac-
ing nodes may collude to exclude nodes from the graph or apply a curacy and less than 2.5 percent of false positives for a variety
Clone-ID attack after collapsing the node to be duplicated. In the of setups. In comparison, CHA–IDS [44] shows an accuracy within
latter case, reputation-based mechanisms can be implemented as 85.2 − 100 percent and up to 0.058 percent false positives, in
a scheme with multi-path duplication of messages, i.e., to verify the worst case. Although they keep a good balance between
node’s compliance. Although this is always the case with IDSs, we accuracy, false positives, and overhead, they neither deal with
consider ASSET as a descent solution to many different attacks, in the attacker’s identification nor with mitigation actions. These
contrast to the related works. limitations probably stem from the fact that Game Theory IDS
employs a distributed placement strategy not taking advantage
5. Related works of the results of a central analysis, and vice versa, CHA–IDS is
a centralized system, not exploiting distributed mechanisms. In-
In the context of RPL, the associated IDSs gain popularity fol- deed, in the case of [59], signature and anomaly detection are
lowing the protocol’s evolution [7,12,14,55]. Literature classifies used in combination, exploiting, further, the rationale of a hybrid
these RPL-related IDSs according to two main criteria [56]: (i) placement strategy. The system brings a high score of as many as
the detection method they employ, and (ii) their placement strat- 8 attacks detected.
egy. Based on the detection method, the IDSs are distinguished Comparing the above hybrid systems is a challenging and not
in: signature detection, anomaly detection, RPL specification-based straightforward task since it is associated with the considered
systems, while hybrid detection IDSs combine at least two of the use-case in terms of required security level and reasonable con-
aforementioned categories. Regarding their placement strategy, trol overhead or processing cost, depending on how an IDS covers
RPL-related IDSs are classified into: centralized, distributed, and the addressed attack(s). Our literature study reveals that different
hybrid placement systems; the latter that blend the rationale of approaches span from simulating all or some of the attacks to
centralized and distributed by keeping the ‘‘heavy’’ tasks for the conceptually supporting coverage for all or subset of the attacks
root or central node(s) and delegating the more lightweight ones under invistigation. Indicatively, authors in [59] introduce a full-
to the rest. conceptual framework, where they discuss but do not evaluate
their IDS. Also, in the case of simulation approaches, differences
3 Although ASSET adopts ideas originating from the SDN world, the scope of concern the simulation environments and the metrics used to as-
this paper covers RPL-related attacks only, rather than the security of SDN IoT sess the IDSs’ performance. Among different approaches, Contiki
systems. Cooja [38] is a common choice; it is also adopted in our work.
711
G. Violettas, G. Simoglou, S. Petridou et al. Future Generation Computer Systems 125 (2021) 698–714
Another challenging issue considering comparison is the lack CRediT authorship contribution statement
of a common framework for IDS evaluation in real environments,
i.e., test-beds. This challenge is reflected in 3rd column of Table 6 George Violettas: Conceptualization, Software, Original draft
which shows that all approaches with evaluation results use preparation, Investigation, Writing. George Simoglou: Visualiza-
simulation. Our previous experience with test-beds participating tion, Data curation, Writing. Sophia Petridou: Writing, Valida-
in the FED4FIRE [60] and GENI [61] federations, in the context tion. Lefteris Mamatas: Methodology, Writing, Supervision.
of 5G network slicing research [62–64], shows that it would be
interesting, but also very challenging, to deploy complete IDSs Declaration of competing interest
in test-beds for evaluation reasons and address possible issues
that arise. Currently, the Sharing Artifacts in a Cybersecurity The authors declare that they have no known competing finan-
Community Hub (SEARCCH) project [65] offers a facility that cial interests or personal relationships that could have appeared
provides validation, repeatable sharing, and reuse of security- to influence the work reported in this paper.
related research results. A relevant initiative for IoT security could
establish a common framework where open-source IDS code Acknowledgments
could be released and comparatively evaluated, e.g., in a com-
mon environment with the same methodology and evaluation Kyriakos Vougioukas provided the testing framework4 for
scenarios. Dixon-Q and Chebyshev’s Inequality tests.
In this work, we exploit observations derived by the recent
bibliography to develop a novel softwarized IDS by-design, in the References
sense that it assigns lightweight tasks, such as monitoring and
first-place detection, to the constraint end-nodes and transfers [1] M. Wollschlaeger, T. Sauter, J. Jasperneite, The future of industrial com-
the demanding tasks to central premises. Besides, ASSET follows a munication: Automation networks in the era of the internet of things &
modular architecture that allows adaptations and/or extendabil- industry 4.0, IEEE Ind. Electron. Mag. 11 (1) (2017) 17–27.
ity. It combines anomaly and specification-based detection and, to [2] T. Winter, et al., RPL: IPv6 routing protocol for low-power and lossy
the best of our knowledge, is the most robust system compared networks, RFC 6550 (2012) 1–157.
to its peers. It detects 13 RPL-related attacks, supports attacker’s [3] O. Gaddour, A. Koubâa, RPL In a nutshell: A survey, Comput. Netw. 56 (14)
identification, and offers several mitigation actions depending on (2012) 3163–3178.
the attack detected. [4] G. Violettas, S. Petridou, L. Mamatas, Evolutionary software defined
networking-inspired routing control strategies for the internet of things,
IEEE Access 7 (2019) 132173–132192.
Conclusion
[5] G. Violettas, S. Petridou, L. Mamatas, Routing under heterogeneity &
mobility for the Internet of Things: a centralized control approach, in:
ASSET’s evaluation has shown that handling attacks against IEEE Global Commun. Conf. (GLOBECOM), 2018, pp. 1–7.
the RPL protocol is challenging and highly dependent on the im- [6] A. Mayzaud, R. Badonnel, I. Chrisment, A taxonomy of attacks in RPL-based
plemented mechanisms targeting one or more specific attack(s). internet of things, Int. J. Netw. Secur. (2016).
Moreover, transferring node-level functions to the centralized [7] A. Verma, V. Ranga, Security of RPL based 6LoWPAN networks in the
infrastructure is more stable and accurate and provides new internet of things: A review, IEEE Sens. J. 20 (11) (2020) 5666–5690.
capabilities to the network administrators. Some attacks can be [8] P. Kamgueu, E. Nataf, T. Ndie, Survey on RPL enhancements: a focus on
handled with high accuracy, while some can be mitigated, leaving topology, security and mobility, Comput. Commun. 120 (2018) 10–21.
the identification of the intruder as an open issue. In addition, [9] J. Granjal, E. Monteiro, J. Silva, Security for the internet of things: a survey
inspired by the softwarization paradigm, by offering centralized of existing protocols and open research issues, IEEE Commun. Surv. Tutor.
intelligence and extendability, ASSET is an ideal platform for 17 (3) (2015) 1294–1312.
[10] M. Landsmann, M. Wahlisch, T. Schmidt, Topology authentication in RPL,
new mechanisms and tools to be tested in the areas of anomaly
in: 2013 IEEE Conf. on Comput. Comm. Workshop (INFOCOM WKSHPS),
detection and SDN-like solutions for RPL and the IoT in general.
0000, pp. 73–74.
ASSET exhibits the following advantages: (i) a holistic work- [11] A. Arena, et al., Evaluating and improving the scalability of RPL security in
flow handling 13 well-known RPL-related attacks; (ii) 3 anomaly the internet of things, Comput. Commun. (2020).
and 4 specification-based attack detection mechanisms, operating [12] A. Raoof, A. Matrawy, C.-H. Lung, Routing attacks and mitigation methods
both at node and controller-level and exhibiting a low number of for RPL-based internet of things, IEEE Commun. Surv. Tutor. 21 (2) (2018)
false positives; (iii) a set of alternative mitigation actions and an 1582–1606.
original attacker identification process; and (iv) an adaptable con- [13] P. Perazzo, et al., An implementation and evaluation of the security
trol and monitoring protocol, trading communication overhead features of RPL, in: Int. Conf. on Ad-Hoc Netw. and Wireless, Springer,
for attacker detection accuracy. 2017, pp. 63–76.
Our next steps include the following aspects: (i) to further [14] G. Simoglou, et al., Intrusion detection systems for RPL security: A
comparative analysis, Comput. Secur. (ISSN: 0167-4048) 104 (2021)
improve (i.e., in width and depth) the attack detection and mit-
102219.
igation, the attacker identification mechanisms, as well as the
[15] P. Pongle, G. Chavan, A survey: Attacks on RPL & 6LoWPAN in IoT, in: 2015
control channel adaptability, including employing change-point IEEE Int. Conf. on Pervasive Computing (ICPC), 0000, pp. 1–6.
analysis for anomaly detection [66,67], (ii) to conduct extensive [16] O. Gnawali, P. Levis, The minimum rank with hysteresis objective function,
experimentation with multiple attacks (also co-existing), attack- RFC 6719 (2012).
ers, topology structures and sizes, experiment configurations, [17] O. Gaddour, et al., OF-FL: QoS-aware fuzzy logic objective function for
including based on real IoT test-beds, to accurately measure the the RPL routing protocol, in: 2014 IEEE 12th Int. Symp. on Modeling and
implications of ASSET to network latency among others, (iii) to Optimization in Mobile, Ad Hoc, and Wireless Netw. (WiOpt), 0000, pp.
incorporate a separate control channel with a long-range inter- 365–372.
face, inspired by [68,69], which can significantly improve ASSET’s [18] T. Clausen, U. Herberg, M. Philipp, A critical evaluation of the IPv6 routing
operation, in terms of communication overhead and attack miti- protocol for low power and lossy networks (RPL), in: 2011 IEEE 7th
Int. Conf. on Wireless and Mobile Computing, Networking and Commun.
gation capability, (iv) to assess the node’s mobility and wireless
(WiMob), 0000, pp. 365–372.
interference impact and how they can affect attack detection
since it can also increase control overhead, e.g., they may cause
false positives in anomaly detection. 4 https://github.com/boygioykaskyriakos/outliers_platform.
712
G. Violettas, G. Simoglou, S. Petridou et al. Future Generation Computer Systems 125 (2021) 698–714
[19] J. Tripathi, J.C. de Oliveira, J.P. Vasseur, A performance evaluation study [47] B. Amidan, T. Ferryman, S. Cooley, Data outlier detection using the
of RPL: Routing protocol for low power & lossy networks, in: 2010 44th Chebyshev theorem, in: 2005 IEEE Aerospace Conf., 0000, pp. 3814–3819.
Annual Conf. on Inf. Sciences and Syst. (CISS), 0000, pp. 1–6. [48] D. Fogel, An introduction to simulated evolutionary optimization, IEEE
[20] P. Pongle, G. Chavan, Real time intrusion and wormhole attack detection Trans. Neural Netw. 5 (1) (1994) 3–14.
in internet of things, Int. J. Comput. Appl. 121 (9) (2015). [49] A. Likas, N. Vlassis, J. Verbeek, The global k-means clustering algorithm,
[21] D. Airehrour, S. Ray, Secure routing for internet of things: A survey, J. Pattern Recognit. 36 (2) (2003) 451–461.
Netw. Comput. Appl. 66 (2016) 198–213. [50] M. Sharir, A strong-connectivity algorithm and its applications in data flow
[22] K. Chugh, L. Aboubaker, J. Loo, Case study of a black hole attack on analysis, Comput. Math. with Appl. 7 (1) (1981) 67–72.
LoWPAN-RPL, in: Proc. of the Sixth Int. Conf. on Emerging Secur. Inf., Syst. [51] T. Cormen, et al., Introduction to Algorithms, The MIT Press, 2009.
and Technol. (SECURWARE), 2012, pp. 157–162. [52] A. Marback, et al., A threat model-based approach to security testing,
[23] L. Wallgren, S. Raza, T. Voigt, Routing attacks and countermeasures in Softw. Pract. Exper. J. 43 (2) (2013) 241–258.
the RPL-based internet of things, Int. J. Distrib. Sens. Netw. 9 (8) (2013)
[53] R. Gupta, et al., Machine learning models for secure data analytics: A
794326.
taxonomy and threat model, Comput. Commun. 153 (2020).
[24] A. Le, et al., The impacts of internal threats towards routing protocol
[54] S. Marano, V. Matta, L. Tong, Distributed detection in the presence of
for low power and lossy network performance, in: 2013 IEEE Symp. on
Byzantine attacks, IEEE Trans. Signal Process. 57 (1) (2008) 16–29.
Comput. and Commun. (ISCC), 0000, pp. 000789–000794.
[55] P. Nandhini, B. Mehtre, Directed acyclic graph inherited attacks and
[25] P. Perazzo, et al., DIO Suppression attack against routing in the internet of
mitigation methods in RPL: a review, in: Int. Conf. on Sustain. Commun.
things, IEEE Commun. Lett. 21 (11) (2017) 2524–2527.
Netw. and Appl., Springer, 2019, pp. 242–252.
[26] T. Umer, et al., Information and resource management systems for in-
[56] B. Zarpelão, et al., A survey of intrusion detection in Internet of Things, J.
ternet of things: Energy management, communication protocols & future
Netw. Comput. Appl. 84 (2017) 25–37.
applications, Future Gener. Comput. Syst. 92 (2019) 1021–1027.
[57] H. Bostani, M. Sheikhan, Hybrid of anomaly-based and specification-based
[27] J.R. Douceur, The sybil attack, in: Int. Workshop on Peer-to-Peer Systems,
IDS for internet of things using unsupervised OPF based on mapreduce
Springer, 2002, pp. 251–260.
approach, Comput. Commun. (2016) 52–71.
[28] A. Le, et al., The impact of rank attack on network topology of routing
[58] H. Sedjelmaci, S. Senouci, T. Taleb, An accurate security game for
protocol for low-power and lossy networks, IEEE Sens. J. 13 (10) (2013)
low-resource IoT devices, IEEE Trans. Veh. Technol. 66 (10) (2017)
3685–3692.
9381–9393.
[29] W. Xie, et al., Routing loops in DAG-based low power and lossy networks,
in: 24th IEEE Int. Conf. on Adv. Inf. Networking and Appl., 2010, pp. [59] J. Kaur, An ultimate approach of mitigating attacks in RPL based low power
888–895. lossy networks, in: Proc. of 17th Int. Conf. on Secur. and Manage. (SAM),
2019.
[30] A. Kamble, V. Malemath, D. Patil, Security attacks and secure routing pro-
tocols in RPL-based internet of things: Survey, in: Int. Conf. on Emerging [60] T. Wauters, et al., Federation of internet experimentation facilities: archi-
Trends Innovation in ICT (ICEI), 2017, pp. 33–39. tecture and implementation, in: European Conf. on Netw. and Commun.
[31] D. Airehrour, J.A. Gutierrez, S.K. Ray, SecTrust-RPL: A secure trust-aware (EuCNC) 2014, IEEE, 0000, pp. 1–5.
RPL routing protocol for internet of things, Future Gener. Comput. Syst. 93 [61] M. Berman, et al., GENI: A federated testbed for innovative network
(2019) 860–876. experiments, Comput. Netw. 61 (2014) 5–23.
[32] A. Sehgal, et al., Addressing DODAG inconsistency attacks in RPL networks, [62] P. Valsamas, et al., Multi-PoP network slice deployment: A feasibility study,
in: 2014 IEEE Global Inf. Infrastructure and Netw. Symp. (GIIS), 0000, pp. in: 2019 IEEE 8th Int, Conf. on Cloud Netw. (CloudNet), 0000, pp. 1–6.
1–8. [63] P.D. Maciel, et al., A marketplace-based approach to cloud network slice
[33] A. Aris, S.F. Oktug, S. Berna Ors Yalcin, RPL version number attacks: In- composition across multiple domains, in: 2019 IEEE Conf. on Netw. Softw.
depth study, in: NOMS 2016 - 2016 IEEE/IFIP Network Operations and (NetSoft), 0000, pp. 480–488.
Manage. Symp., 0000, pp. 776–779. [64] P. Valsamas, et al., A multi-domain experimentation environment for 5G
[34] A. Mayzaud, et al., A study of RPL DODAG version attacks, in: IFIP Int. Conf. media verticals, in: IEEE 2019 Conf. on Comput. Commun. Workshops,
on Auton. Infrastructure, Manage. and Secur., Springer, 2014, pp. 92–104. 0000, pp. 461–466.
[35] A. Le, et al., A specification-based IDS for detecting attacks on RPL-based [65] F.R. Group, The university of utah, 2020, https://www.flux.utah.edu/index.
network topology, Information 7 (2) (2016) 25. [66] S. Skaperas, L. Mamatas, A. Chorti, Real-time video content popularity
[36] T. Theodorou, et al., A multi-protocol software-defined networking solution detection based on mean change point analysis, IEEE Access 7 (2019)
for the internet of things, IEEE Commun. Mag. 57 (10) (2019) 42–48. 142246–142260.
[37] G. Violettas, et al., An experimentation facility enabling flexible network [67] S. Skaperas, L. Mamatas, A. Chorti, Real-time algorithms for the detection of
control for the Internet of Things, in: IEEE 2019 Conf. on Comput. Commun. changes in the variance of video content popularity, IEEE Access 8 (2020)
Workshops, 0000, pp. 992–993. 30445–30457.
[38] A. Dunkels, B. Gronvall, T. Voigt, Contiki - a lightweight and flexible [68] T. Theodorou, L. Mamatas, A versatile out-of-band software-defined
operating system for tiny networked sensors, in: 29th Annual IEEE Int. networking solution for the internet of things, IEEE Access 8 (2020)
Conf. on Local Comput. Netw., 2004, pp. 455–462. 103710–103733.
[39] I.H. Witten, et al. (Eds.), The WEKA workbench, in: Data Mining, Morgan [69] T. Theodorou, L. Mamatas, SD-MIoT: A software-defined networking
Kaufmann, 2017, pp. 553–571. solution for mobile internet of things, IEEE Internet Things J. (2020) 1.
[40] Graphstream, 2018, https://github.com/graphstream.
[41] S. Schaller, D. Hood, Software defined networking architecture standard-
ization, Comput. Stand. Interfaces 54 (2017) 197–202.
George Violettas earned his Ph.D. in Network Control
[42] A. Dutot, et al., GraphStream: A tool for bridging the gap between complex
and Security for the Internet of Things from the
systems and dynamic graphs, in: EPNACS’2007, 0000, pp. 63.
University of Macedonia, Thessaloniki, Greece. He holds
[43] S. Raza, L. Wallgren, T. Voigt, SVELTE: Real-time intrusion detection in the an M.Sc. Degree in Applied Informatics from the same
internet of things, Ad Hoc Netw. 11 (8) (2013) 2661–2674. University, and a 4-yrs Bachelor in Computer Science
[44] M.N. Napiah, et al., Compression header analyzer intrusion detection from the Hellenic Open University. He has worked as
system (CHA - IDS) for 6LoWPAN communication protocol, IEEE Access a senior researcher in EU founded projects (Horizon
6 (2018) 16623–16638. 2020): NECOS H2020 (Novel Enablers for Cloud Slic-
[45] S. Kalamkar, A. Banerjee, A. Roychowdhury, Malicious user suppression for ing), UNIC (Unikernel-based CDNs for 5G Networks,
FED4FIRE+ Open Call 4, H2020), MEC (Multi-homing
cooperative spectrum sensing in cognitive radio networks using Dixon’s
with Ephemeral Clouds on the Move in MONROE Open
outlier detection method, in: 2012 National Conf. on Commun. (NCC), IEEE,
Call 2, H2020) and CORAL (Cross-Layer Control of Data Flows, WiSHFUL Open
0000, pp. 1–5. Call 2, H2020). He has hands-on experience with experimentation facilities and
[46] C. Efstathiou, Estimation of type i error probability from experimental test-beds (Fed4fire, Emulab, Monroe).
dixon’s ‘‘Q’’ parameter on testing for outliers within small size data sets,
Talanta 69 (5) (2006) 1068–1071.
713
G. Violettas, G. Simoglou, S. Petridou et al. Future Generation Computer Systems 125 (2021) 698–714
George Simoglou received his B.Sc. degree in Applied MONROE Open Call 2, H2020) and CORAL (Cross-Layer Control of Data Flows,
Informatics from the University of Macedonia, Thes- WiSHFUL Open Call 2, H2020). She has more than 40 publications in journals
saloniki, Greece. His B.Sc. thesis was on the Security and conferences. She is a Member of the IEEE Computer Society and serves as
issues of the RPL routing protocol, presented on Feb. an Associate Editor of the International Journal of Communication Systems.
2020. He is currently working as a Web and software
developer. His research interests include Internet of
Things, network protocols and security. Lefteris Mamatas is an Associate Professor in the
Department of Applied Informatics, University of Mace-
donia, Greece. He leads the Softwarized & Wireless
Networks Research Group (http://swn.uom.gr) in the
same University. He worked as a researcher at the
University College London (UK), Space Internetworking
Sophia Petridou is an Assistant Professor in the Center/Democritus University of Thrace (Greece), and
Department of Applied Informatics, University of Mace- DoCoMo Eurolabs (Germany). His research interests lie
donia. She received her Ph.D. from the Department of in the areas of Software-Defined Networks, Internet
Informatics, Aristotle University of Thessaloniki, Greece of Things, 5G Networks, and Multi-Access Edge Com-
in 2008. Her main research interests are in the areas puting. He participated in many international research
of Internet of Things, Wireless and Optical networks’ projects, such as NECOS (H2020), FED4FIRE+ OC4 (H2020), WiSHFUL OC2
protocols, formal verifications and probabilistic model (H2020), MONROE OC2 (H2020), Dolfin (FP7), UniverSELF (FP7), and Extending
checking of protocols, protocols’ security. She has Internet into Space (ESA). He has published more than 60 papers in interna-
been involved in international research projects of: tional journals and conferences. He served as a General Chair for the WWIC 2016
NECOS H2020 (Novel Enablers for Cloud Slicing) , UNIC conference and the INFOCOM SWFAN 2016 workshop, as a TPC Chair for the
(Unikernel-based CDNs for 5G Networks, FED4FIRE+ INFOCOM SWFAN 2017, E-DTN 2009, IFIP WWIC 2012 conferences/workshops
Open Call 4, H2020), MEC (Multi-homing with Ephemeral Clouds on the Move, and as a Guest Editor for the Elsevier Ad Hoc Networks Journal.
714