Abstract
The IETF designed the Routing Protocol for Low power and Lossy Networks (RPL) as a candidate for use in constrained networks. Keeping in mind the different requirements of such networks, the protocol was designed to support multiple routing topologies, called DODAGs, constructed using different objective functions, so as to optimize routing based on divergent metrics. A DODAG versioning system is incorporated into RPL in order to ensure that the topology does not become stale and that loops are not formed over time. However, an attacker can exploit this versioning system to gain an advantage in the topology and also acquire children that would be forced to route packets via this node. In this paper we present a study of possible attacks that exploit the DODAG version system. The impact on overhead, delivery ratio, end-to-end delay, rank inconsistencies and loops is studied.
Chapter PDF
Similar content being viewed by others
References
Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J., Alexander, R.: RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. IETF RFC 6550 (March 2012)
Seeber, S., Sehgal, A., Stelte, B., Rodosek, G.D., Schönwälder, J.: Towards A Trust Computing Architecture for RPL in Cyber Physical Systems. In: IFIP/IEEE International Conference on Network and Service Management (CNSM), Zürich, Switzerland (October 2013)
Sehgal, A., Perelman, V., Kuryla, S., Schönwälder, J.: Management of Resource Constrained Devices in the Internet of Things. IEEE Communications Magazine 50(12), 144–149 (2012)
Dunkels, A., Gronvall, B., Voigt, T.: Contiki - a Lightweight and Flexible Operating System for Tiny Networked Sensors. In: 29th Annual IEEE International Conference on Local Computer Networks (LCN), Tampa, FL (November 2004)
Ko, J., Dawson-Haggerty, S., Gnawali, O., Culler, D., Terzis, A.: Evaluating the Performance of RPL and 6LoWPAN in TinyOS. In: Workshop on Extending the Internet to Low Power and Lossy Networks (IP+SN), Chicago, IL (April 2011)
Baccelli, E., Hahm, O., Günes, M., Wählisch, M., Schmidt, T.C.: RIOT OS: Towards an OS for the Internet of Things. In: 32nd IEEE INFOCOM Poster Session, Turin, Italy (April 2013)
Cheneau, T.: SimpleRPL (February 2014), https://github.com/tcheneau/simpleRPL
Tsao, T., Alexander, R., Dohler, M., Daza, V., Lozano, A., Richardson, M.: A Security Threat Analysis for Routing Protocol for Low-power and Lossy Networks (RPL). IETF Internet Draft <draft-ietf-roll-security-threats-06> (December 2013)
Chugh, K., Aboubaker, L., Loo, J.: Case Study of a Black Hole Attack on LoWPAN-RPL. In: Proc. of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), Rome, Italy, pp. 157–162 (August 2012)
Weekly, K., Pister, K.: Evaluating Sinkhole Defense Techniques in RPL Networks. In: 20th IEEE International Conference on Network Protocols (ICNP), Austin, TX, pp. 1–6 (November 2012)
Wallgren, L., Raza, S., Voigt, T.: Routing Attacks and Countermeasures in the RPL-Based Internet of Things. International Journal of Distributed Sensor Networks 13(794326) (2013)
Landsmann, M., Perrey, H., Ugus, O., Wählisch, M., Schmidt, T.: Topology Authentication in RPL. In: 32nd IEEE INFOCOM Poster Session, Turin, Italy (April 2013)
Dvir, A., Holczer, T., Buttyan, L.: VeRA - Version Number and Rank Authentication in RPL. In: 8th IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), Hangzhou, China, pp. 709–714 (October 2011)
Perrey, H., Landsmann, M., Ugus, O., Wählisch, M., Schmidt, T.: TRAIL: Topology Authentication in RPL. arXiv preprint arXiv:1312.0984 (2013)
Levis, P.A., Patel, N., Culler, D., Shenker, S.: Trickle: A Self Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks. In: 1st Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA (March 2004)
Hui, J., Vasseur, J.: The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams. IETF RFC 6553 (March 2012)
Korte, K.D., Sehgal, A., Schönwälder, J.: A Study of the RPL Repair Process Using ContikiRPL. In: Sadre, R., Novotný, J., Čeleda, P., Waldburger, M., Stiller, B. (eds.) AIMS 2012. LNCS, vol. 7279, pp. 50–61. Springer, Heidelberg (2012)
Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: Cross-Level Sensor Network Simulation with COOJA. In: 31st IEEE Conference on Local Computer Networks (LCN), Tampa, FL, pp. 641–648 (November 2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 International Federation for Information Processing
About this paper
Cite this paper
Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., Schönwälder, J. (2014). A Study of RPL DODAG Version Attacks. In: Sperotto, A., Doyen, G., Latré, S., Charalambides, M., Stiller, B. (eds) Monitoring and Securing Virtualized Networks and Services. AIMS 2014. Lecture Notes in Computer Science, vol 8508. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43862-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-662-43862-6_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43861-9
Online ISBN: 978-3-662-43862-6
eBook Packages: Computer ScienceComputer Science (R0)