A Lightweight Security Solution for Mitigation of Hatchetman Attack in RPL-based 6LoWPAN
- URL: http://arxiv.org/abs/2404.01689v1
- Date: Tue, 2 Apr 2024 06:48:33 GMT
- Title: A Lightweight Security Solution for Mitigation of Hatchetman Attack in RPL-based 6LoWPAN
- Authors: Girish Sharma, Jyoti Grover, Abhishek Verma,
- Abstract summary: The Internet of Things (IoT) has a significant rise in industries, and we live in the era of Industry 4.0.
The conventional routing method is ineffective in networks with limited resource devices, lossy links, and slow data rates.
This paper shows significant degradation in terms of network performance when an attacker exploits the Non-Storing feature of the Routing Protocol for Low Power and Lossy Networks (RPL)
- Score: 0.24578723416255752
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: In recent times, the Internet of Things (IoT) has a significant rise in industries, and we live in the era of Industry 4.0, where each device is connected to the Internet from small to big. These devices are Artificial Intelligence (AI) enabled and are capable of perspective analytics. By 2023, it's anticipated that over 14 billion smart devices will be available on the Internet. These applications operate in a wireless environment where memory, power, and other resource limitations apply to the nodes. In addition, the conventional routing method is ineffective in networks with limited resource devices, lossy links, and slow data rates. Routing Protocol for Low Power and Lossy Networks (RPL), a new routing protocol for such networks, was proposed by the IETF's ROLL group. RPL operates in two modes: Storing and Non-Storing. In Storing mode, each node have the information to reach to other node. In Non-Storing mode, the routing information lies with the root node only. The attacker may exploit the Non-Storing feature of the RPL. When the root node transmits User Datagram Protocol~(UDP) or control message packet to the child nodes, the routing information is stored in the extended header of the IPv6 packet. The attacker may modify the address from the source routing header which leads to Denial of Service (DoS) attack. This attack is RPL specific which is known as Hatchetman attack. This paper shows significant degradation in terms of network performance when an attacker exploits this feature. We also propose a lightweight mitigation of Hatchetman attack using game theoretic approach to detect the Hatchetman attack in IoT.
Related papers
- A comprehensive survey on RPL routing-based attacks, defences and future directions in Internet of Things [2.2254540765657755]
Internet of Things (IoT) devices are vulnerable to various attacks on RPL-based routing.
This survey provides an in depth study of existing RPL-based attacks and defense published from year 2011 to 2024.
evaluation tools such as testbeds and simulators for RPL-based attack and defense are discussed.
arXiv Detail & Related papers (2025-01-18T16:30:00Z) - Li-MSD: A lightweight mitigation solution for DAO insider attack in RPL-based IoT [0.8185520338218353]
This paper shows that an aggressive insider attacker can drastically degrade network performance.
We propose a Lightweight Solution for Mitigation of insider attack, which is termed as 'Li-MSD'
By using simulations, it is shown that Li-MSD outperforms the existing solution in the literature.
arXiv Detail & Related papers (2024-09-16T06:17:20Z) - Spiker+: a framework for the generation of efficient Spiking Neural
Networks FPGA accelerators for inference at the edge [49.42371633618761]
Spiker+ is a framework for generating efficient, low-power, and low-area customized Spiking Neural Networks (SNN) accelerators on FPGA for inference at the edge.
Spiker+ is tested on two benchmark datasets, the MNIST and the Spiking Heidelberg Digits (SHD)
arXiv Detail & Related papers (2024-01-02T10:42:42Z) - The Dark Side of AutoML: Towards Architectural Backdoor Search [49.16544351888333]
EVAS is a new attack that leverages NAS to find neural architectures with inherent backdoors and exploits such vulnerability using input-aware triggers.
EVAS features high evasiveness, transferability, and robustness, thereby expanding the adversary's design spectrum.
This work raises concerns about the current practice of NAS and points to potential directions to develop effective countermeasures.
arXiv Detail & Related papers (2022-10-21T18:13:23Z) - Safe RAN control: A Symbolic Reinforcement Learning Approach [62.997667081978825]
We present a Symbolic Reinforcement Learning (SRL) based architecture for safety control of Radio Access Network (RAN) applications.
We provide a purely automated procedure in which a user can specify high-level logical safety specifications for a given cellular network topology.
We introduce a user interface (UI) developed to help a user set intent specifications to the system, and inspect the difference in agent proposed actions.
arXiv Detail & Related papers (2021-06-03T16:45:40Z) - Packet-Loss-Tolerant Split Inference for Delay-Sensitive Deep Learning
in Lossy Wireless Networks [4.932130498861988]
In distributed inference, computational tasks are offloaded from the IoT device to other devices or the edge server via lossy IoT networks.
narrow-band and lossy IoT networks cause non-negligible packet losses and retransmissions, resulting in non-negligible communication latency.
We propose a split inference with no retransmissions (SI-NR) method that achieves high accuracy without any retransmissions, even when packet loss occurs.
arXiv Detail & Related papers (2021-04-28T08:28:22Z) - Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G
and Beyond [46.34482158291128]
A deep neural network (DNN) can predict the beam that is best slanted to each UE by using the received signal strengths ( RSSs) from a subset of possible narrow beams.
We present an adversarial attack by generating perturbations to manipulate the over-the-air captured RSSs as the input to the DNN.
This attack reduces the IA performance significantly and fools the DNN into choosing the beams with small RSSs compared to jamming attacks with Gaussian or uniform noise.
arXiv Detail & Related papers (2021-03-25T17:25:21Z) - TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack [46.79557381882643]
We present TANTRA, a novel end-to-end Timing-based Adversarial Network Traffic Reshaping Attack.
Our evasion attack utilizes a long short-term memory (LSTM) deep neural network (DNN) which is trained to learn the time differences between the target network's benign packets.
TANTRA achieves an average success rate of 99.99% in network intrusion detection system evasion.
arXiv Detail & Related papers (2021-03-10T19:03:38Z) - Adversarial Attacks on Deep Learning Based Power Allocation in a Massive
MIMO Network [62.77129284830945]
We show that adversarial attacks can break DL-based power allocation in the downlink of a massive multiple-input-multiple-output (maMIMO) network.
We benchmark the performance of these attacks and show that with a small perturbation in the input of the neural network (NN), the white-box attacks can result in infeasible solutions up to 86%.
arXiv Detail & Related papers (2021-01-28T16:18:19Z) - SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL
Protocol-Based Node Rating and Ranking Mechanism [1.2691047660244335]
IoTs are endowed with particular routing disobedience called sinkhole attack owing to their distributed features.
In these attacks, a malicious node broadcasts illusive information regarding the routings to impose itself as a route towards specific nodes for the neighboring nodes and thus, attract data traffic.
In this paper, the technique is assessed through wide simulations performed within the NS-3 environment. Based on the results of the simulation, it is indicated that the IoT network behavior metrics are enhanced based on the detection rate, false-negative rate, false-positive rate, packet delivery rate, maximum throughput, and packet loss rate.
arXiv Detail & Related papers (2020-05-17T09:26:09Z) - Multi-stage Jamming Attacks Detection using Deep Learning Combined with
Kernelized Support Vector Machine in 5G Cloud Radio Access Networks [17.2528983535773]
This research focuses on deploying a multi-stage machine learning-based intrusion detection (ML-IDS) in 5G C-RAN.
It can detect and classify four types of jamming attacks: constant jamming, random jamming, jamming, and reactive jamming.
The final classification accuracy of attacks is 94.51% with a 7.84% false negative rate.
arXiv Detail & Related papers (2020-04-13T17:21:45Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.