Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses
With increasingly prevalent wireless sensors and devices, low power and lossy networks (LLNs) play an essential role in the realization of ubiquitous computing and communication infrastructure, which, in turn, leads to enhanced data accessibility and availability. A multicast protocol for LLNs (MPL)...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2018-09-01
|
Series: | Sensors |
Subjects: | |
Online Access: | http://www.mdpi.com/1424-8220/18/10/3236 |
id |
doaj-b63e46ab77ac4d08a2bd0309ba4a5a3d |
---|---|
record_format |
Article |
spelling |
doaj-b63e46ab77ac4d08a2bd0309ba4a5a3d2020-11-25T00:45:33ZengMDPI AGSensors1424-82202018-09-011810323610.3390/s18103236s18103236Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and DefensesCong Pu0Xitong Zhou1Weisberg Division of Computer Science, Marshall University, Huntington, WV 25755, USAMS Graduate of Computer Science, Marshall University, Huntington, WV 25755, USAWith increasingly prevalent wireless sensors and devices, low power and lossy networks (LLNs) play an essential role in the realization of ubiquitous computing and communication infrastructure, which, in turn, leads to enhanced data accessibility and availability. A multicast protocol for LLNs (MPL), has been standardized to provide both efficient and reliable multicast communication. Due to the shared wireless medium, lack of tamper resistance, and inherent resource constraints, MPL-based LLNs are undoubtedly vulnerable to various Denial-of-Service (DoS) attacks. In this paper, we propose a heuristic-based detection scheme, called HED, against the suppression attack in MPL-based LLNs, where a malicious node multicasts a series of spoof data messages with continuous sequence numbers to prevent normal nodes from accepting valid data messages and cause them to delete cached data messages. In the HED, each node maintains an increment rate of the minimum sequence number in the Seed Set to detect the potential malicious node by comparing the recent increment of sequence numbers with the heuristically calculated increment threshold of sequence numbers. We evaluate the proposed scheme through extensive simulation experiments using OMNeT++ and compare its performance with original MPL with and without adversary, respectively. The simulation results show high detection rate and packet reception rate but low false detection rate, and indicate that the proposed scheme is a potentially viable approach against the suppression attack in MPL-based LLNs.http://www.mdpi.com/1424-8220/18/10/3236Denial-of-Service attacklow power and lossy networksmulticast protocolsuppression attack |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Cong Pu Xitong Zhou |
spellingShingle |
Cong Pu Xitong Zhou Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses Sensors Denial-of-Service attack low power and lossy networks multicast protocol suppression attack |
author_facet |
Cong Pu Xitong Zhou |
author_sort |
Cong Pu |
title |
Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses |
title_short |
Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses |
title_full |
Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses |
title_fullStr |
Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses |
title_full_unstemmed |
Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses |
title_sort |
suppression attack against multicast protocol in low power and lossy networks: analysis and defenses |
publisher |
MDPI AG |
series |
Sensors |
issn |
1424-8220 |
publishDate |
2018-09-01 |
description |
With increasingly prevalent wireless sensors and devices, low power and lossy networks (LLNs) play an essential role in the realization of ubiquitous computing and communication infrastructure, which, in turn, leads to enhanced data accessibility and availability. A multicast protocol for LLNs (MPL), has been standardized to provide both efficient and reliable multicast communication. Due to the shared wireless medium, lack of tamper resistance, and inherent resource constraints, MPL-based LLNs are undoubtedly vulnerable to various Denial-of-Service (DoS) attacks. In this paper, we propose a heuristic-based detection scheme, called HED, against the suppression attack in MPL-based LLNs, where a malicious node multicasts a series of spoof data messages with continuous sequence numbers to prevent normal nodes from accepting valid data messages and cause them to delete cached data messages. In the HED, each node maintains an increment rate of the minimum sequence number in the Seed Set to detect the potential malicious node by comparing the recent increment of sequence numbers with the heuristically calculated increment threshold of sequence numbers. We evaluate the proposed scheme through extensive simulation experiments using OMNeT++ and compare its performance with original MPL with and without adversary, respectively. The simulation results show high detection rate and packet reception rate but low false detection rate, and indicate that the proposed scheme is a potentially viable approach against the suppression attack in MPL-based LLNs. |
topic |
Denial-of-Service attack low power and lossy networks multicast protocol suppression attack |
url |
http://www.mdpi.com/1424-8220/18/10/3236 |
work_keys_str_mv |
AT congpu suppressionattackagainstmulticastprotocolinlowpowerandlossynetworksanalysisanddefenses AT xitongzhou suppressionattackagainstmulticastprotocolinlowpowerandlossynetworksanalysisanddefenses |
_version_ |
1725269580707790848 |