Low-Power and Lossy Networks (LLNs) run on resource-constrained devices and play a key role in many Industrial Internet of Things and Cyber-Physical Systems based applications. But, achieving an energy-efficient routing in LLNs is a major challenge nowadays. This challenge is addressed by Routing Protocol for Low-power Lossy Networks (RPL), which is specified in RFC 6550 as a "Proposed Standard" at present. In RPL, a client node uses Destination Advertisement Object (DAO) control messages to pass on the destination information towards the root node. An attacker may exploit the DAO sending mechanism of RPL to perform a DAO Insider attack in LLNs. In this paper, it is shown that an aggressive attacker can drastically degrade the network performance. To address DAO Insider attack, a lightweight defense solution is proposed. The proposed solution uses an early blacklisting strategy to significantly mitigate the attack and restore RPL performance. The proposed solution is implemented and tested on Cooja Simulator.
翻译:低功率和损失网络(LLNs)在资源受限制的装置上运行,在许多基于物品和网络物理系统应用的工业互联网上发挥着关键作用。但是,在LLNs中实现节能路线是当今的一项重大挑战。这个挑战通过RFC 6550中作为目前“拟议标准”而指定的低功率和损失网络(RPL)的运行协议来解决。在RPL中,客户节点使用目的地广告对象控制信息将目标信息传递到根节点。攻击者可能利用DAO的DAO发送机制对LLNs进行DAO内线攻击。在本文中显示,攻击者可以大幅降低网络的性能。针对DAO Interr攻击,提出了轻度防御解决方案。拟议解决方案使用早期黑名单战略显著减轻攻击并恢复RPL的性能。拟议解决方案在Coja Simulator上实施并测试。</s>