Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses

With increasingly prevalent wireless sensors and devices, low power and lossy networks (LLNs) play an essential role in the realization of ubiquitous computing and communication infrastructure, which, in turn, leads to enhanced data accessibility and availability. A multicast protocol for LLNs (MPL)...

Full description

Bibliographic Details
Main Authors: Cong Pu, Xitong Zhou
Format: Article
Language:English
Published: MDPI AG 2018-09-01
Series:Sensors
Subjects:
Online Access:http://www.mdpi.com/1424-8220/18/10/3236
id doaj-b63e46ab77ac4d08a2bd0309ba4a5a3d
record_format Article
spelling doaj-b63e46ab77ac4d08a2bd0309ba4a5a3d2020-11-25T00:45:33ZengMDPI AGSensors1424-82202018-09-011810323610.3390/s18103236s18103236Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and DefensesCong Pu0Xitong Zhou1Weisberg Division of Computer Science, Marshall University, Huntington, WV 25755, USAMS Graduate of Computer Science, Marshall University, Huntington, WV 25755, USAWith increasingly prevalent wireless sensors and devices, low power and lossy networks (LLNs) play an essential role in the realization of ubiquitous computing and communication infrastructure, which, in turn, leads to enhanced data accessibility and availability. A multicast protocol for LLNs (MPL), has been standardized to provide both efficient and reliable multicast communication. Due to the shared wireless medium, lack of tamper resistance, and inherent resource constraints, MPL-based LLNs are undoubtedly vulnerable to various Denial-of-Service (DoS) attacks. In this paper, we propose a heuristic-based detection scheme, called HED, against the suppression attack in MPL-based LLNs, where a malicious node multicasts a series of spoof data messages with continuous sequence numbers to prevent normal nodes from accepting valid data messages and cause them to delete cached data messages. In the HED, each node maintains an increment rate of the minimum sequence number in the Seed Set to detect the potential malicious node by comparing the recent increment of sequence numbers with the heuristically calculated increment threshold of sequence numbers. We evaluate the proposed scheme through extensive simulation experiments using OMNeT++ and compare its performance with original MPL with and without adversary, respectively. The simulation results show high detection rate and packet reception rate but low false detection rate, and indicate that the proposed scheme is a potentially viable approach against the suppression attack in MPL-based LLNs.http://www.mdpi.com/1424-8220/18/10/3236Denial-of-Service attacklow power and lossy networksmulticast protocolsuppression attack
collection DOAJ
language English
format Article
sources DOAJ
author Cong Pu
Xitong Zhou
spellingShingle Cong Pu
Xitong Zhou
Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses
Sensors
Denial-of-Service attack
low power and lossy networks
multicast protocol
suppression attack
author_facet Cong Pu
Xitong Zhou
author_sort Cong Pu
title Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses
title_short Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses
title_full Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses
title_fullStr Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses
title_full_unstemmed Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses
title_sort suppression attack against multicast protocol in low power and lossy networks: analysis and defenses
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2018-09-01
description With increasingly prevalent wireless sensors and devices, low power and lossy networks (LLNs) play an essential role in the realization of ubiquitous computing and communication infrastructure, which, in turn, leads to enhanced data accessibility and availability. A multicast protocol for LLNs (MPL), has been standardized to provide both efficient and reliable multicast communication. Due to the shared wireless medium, lack of tamper resistance, and inherent resource constraints, MPL-based LLNs are undoubtedly vulnerable to various Denial-of-Service (DoS) attacks. In this paper, we propose a heuristic-based detection scheme, called HED, against the suppression attack in MPL-based LLNs, where a malicious node multicasts a series of spoof data messages with continuous sequence numbers to prevent normal nodes from accepting valid data messages and cause them to delete cached data messages. In the HED, each node maintains an increment rate of the minimum sequence number in the Seed Set to detect the potential malicious node by comparing the recent increment of sequence numbers with the heuristically calculated increment threshold of sequence numbers. We evaluate the proposed scheme through extensive simulation experiments using OMNeT++ and compare its performance with original MPL with and without adversary, respectively. The simulation results show high detection rate and packet reception rate but low false detection rate, and indicate that the proposed scheme is a potentially viable approach against the suppression attack in MPL-based LLNs.
topic Denial-of-Service attack
low power and lossy networks
multicast protocol
suppression attack
url http://www.mdpi.com/1424-8220/18/10/3236
work_keys_str_mv AT congpu suppressionattackagainstmulticastprotocolinlowpowerandlossynetworksanalysisanddefenses
AT xitongzhou suppressionattackagainstmulticastprotocolinlowpowerandlossynetworksanalysisanddefenses
_version_ 1725269580707790848