Cargando…

Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses

With increasingly prevalent wireless sensors and devices, low power and lossy networks (LLNs) play an essential role in the realization of ubiquitous computing and communication infrastructure, which, in turn, leads to enhanced data accessibility and availability. A multicast protocol for LLNs (MPL)...

Descripción completa

Detalles Bibliográficos
Autores principales: Pu, Cong, Zhou, Xitong
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6210781/
https://www.ncbi.nlm.nih.gov/pubmed/30261619
http://dx.doi.org/10.3390/s18103236
_version_ 1783367196242608128
author Pu, Cong
Zhou, Xitong
author_facet Pu, Cong
Zhou, Xitong
author_sort Pu, Cong
collection PubMed
description With increasingly prevalent wireless sensors and devices, low power and lossy networks (LLNs) play an essential role in the realization of ubiquitous computing and communication infrastructure, which, in turn, leads to enhanced data accessibility and availability. A multicast protocol for LLNs (MPL), has been standardized to provide both efficient and reliable multicast communication. Due to the shared wireless medium, lack of tamper resistance, and inherent resource constraints, MPL-based LLNs are undoubtedly vulnerable to various Denial-of-Service (DoS) attacks. In this paper, we propose a heuristic-based detection scheme, called HED, against the suppression attack in MPL-based LLNs, where a malicious node multicasts a series of spoof data messages with continuous sequence numbers to prevent normal nodes from accepting valid data messages and cause them to delete cached data messages. In the HED, each node maintains an increment rate of the minimum sequence number in the Seed Set to detect the potential malicious node by comparing the recent increment of sequence numbers with the heuristically calculated increment threshold of sequence numbers. We evaluate the proposed scheme through extensive simulation experiments using OMNeT++ and compare its performance with original MPL with and without adversary, respectively. The simulation results show high detection rate and packet reception rate but low false detection rate, and indicate that the proposed scheme is a potentially viable approach against the suppression attack in MPL-based LLNs.
format Online
Article
Text
id pubmed-6210781
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-62107812018-11-02 Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses Pu, Cong Zhou, Xitong Sensors (Basel) Article With increasingly prevalent wireless sensors and devices, low power and lossy networks (LLNs) play an essential role in the realization of ubiquitous computing and communication infrastructure, which, in turn, leads to enhanced data accessibility and availability. A multicast protocol for LLNs (MPL), has been standardized to provide both efficient and reliable multicast communication. Due to the shared wireless medium, lack of tamper resistance, and inherent resource constraints, MPL-based LLNs are undoubtedly vulnerable to various Denial-of-Service (DoS) attacks. In this paper, we propose a heuristic-based detection scheme, called HED, against the suppression attack in MPL-based LLNs, where a malicious node multicasts a series of spoof data messages with continuous sequence numbers to prevent normal nodes from accepting valid data messages and cause them to delete cached data messages. In the HED, each node maintains an increment rate of the minimum sequence number in the Seed Set to detect the potential malicious node by comparing the recent increment of sequence numbers with the heuristically calculated increment threshold of sequence numbers. We evaluate the proposed scheme through extensive simulation experiments using OMNeT++ and compare its performance with original MPL with and without adversary, respectively. The simulation results show high detection rate and packet reception rate but low false detection rate, and indicate that the proposed scheme is a potentially viable approach against the suppression attack in MPL-based LLNs. MDPI 2018-09-26 /pmc/articles/PMC6210781/ /pubmed/30261619 http://dx.doi.org/10.3390/s18103236 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Pu, Cong
Zhou, Xitong
Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses
title Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses
title_full Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses
title_fullStr Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses
title_full_unstemmed Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses
title_short Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses
title_sort suppression attack against multicast protocol in low power and lossy networks: analysis and defenses
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6210781/
https://www.ncbi.nlm.nih.gov/pubmed/30261619
http://dx.doi.org/10.3390/s18103236
work_keys_str_mv AT pucong suppressionattackagainstmulticastprotocolinlowpowerandlossynetworksanalysisanddefenses
AT zhouxitong suppressionattackagainstmulticastprotocolinlowpowerandlossynetworksanalysisanddefenses