Skip to main content
Log in

Jamming-Resilient Backup Nodes Selection for RPL-based Routing in Smart Grid AMI Networks

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Advanced metering infrastructure (AMI) is the core component of the smart grid. As the wireless connection between smart meters in AMI is featured with high packet loss and low transmission rate, AMI is considered as a representative of the low power and lossy networks (LLNs). In such communication environment, the routing protocol in AMI network is essential to ensure the reliability and real-time of data transmission. The IPv6 routing protocol for low-power and lossy networks (RPL), proposed by IETF ROLL working group, is considered to be the best routing solution for the AMI communication environment. However, the performance of RPL can be seriously degraded due to jamming attack. In this paper, we analyze the performance degradation problem of RPL protocol under jamming attack. We propose a backup node selection mechanism based on the standard RPL protocol. The proposed mechanism chooses a predefined number of backup nodes that maximize the probability of successful transmission. We evaluation the proposed mechanism through MATLAB simulations, results show the proposed mechanism improves the performance of RPL under jamming attack prominently.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Ancillotti E, Bruno R, Conti M (2012) “RPL routing protocol in advanced metering infrastructures: An analysis of the unreliability problems”. In: proceedings of the Sustainable Internet and ICT for Sustainability, sustain IT, Pisa, Italy, pp 1–10

  2. Winter T, Thubert P, Brandt A, Hui JW, Kelsey R, Levis P, Pister K, Struik R, Vasseur J, Alexander RK (2012) “RPL: Ipv6 routing protocol for low-power and lossy networks”, vol 6550

  3. Renofio JRR, Pellenz ME, Jamhour E, Santin AO, Penna MC, Souza RD (2016) “On the dynamics of the RPL protocol in AMI networks under jamming attacks”. In: proceedings of the IEEE International Conference on Communications, ICC, Kuala Lumpur Malaysia, pp 1–6

  4. Pavkovic B, Theoleyre F, Duda A (2011) “Multipath opportunistic RPL routing over IEEE 802.15.4”. In: proceedings of the International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, MSW im, Miami, Florida, USA, pp 179–186

  5. Duquennoy S, Landsiedel O, Voigt T (2013) “Let the tree bloom: scalable opportunistic routing with ORPL,”. In: proceedings of the ACM Conference on Embedded Network Sensor Systems, SenSys, Roma, Italy, vol 2, pp 1–2:14

  6. Tahir Y, Yang S, McCann JA (2018) BRPL: Backpressure RPL for high-throughput and mobile iots. IEEE Trans Mob Comput 17(1):29–43

    Article  Google Scholar 

  7. Ji X, He Y, Wang J, Dong W, Wu X, Liu Y (2014) “Walking down the STAIRS: efficient collision resolution for wireless sensor networks”. In: proceedings of the IEEE Conference on Computer Communications, INFOCOM, Toronto Canada, pp 961–969

  8. Ji X, He Y, Wang J, Wu K, Liu D, Yi K, Liu Y (2017) “On improving wireless channel utilization: A collision tolerance-based approach”. IEEE T Mobile Comput 16(3):787–800

    Article  Google Scholar 

  9. Mustafa HA, Zhang X, Liu Z, Xu W, Perrig A (2012) Jamming-resilient multipath routing. IEEE T Depend Secure Comp 9(6):852–864

    Article  Google Scholar 

  10. Gnawali O, Levis P (2012) “The minimum rank with hysteresis objective function”, vol 6719

  11. Ancillotti E, Bruno R, Conti M (2013) “The role of the RPL routing protocol for smart grid communications”. IEEE Commun Mag 51(1):75–83

    Article  Google Scholar 

  12. Ropitault T, Lampropulos A, Pelov A, Toutain L, Vedantham R, Chiummiento P (2014) “Doing it right - recommendations for RPL in plc-based networks for the smart grid”. In: proceedings of the IEEE International Conference on Smart Grid Communications, SmartGridComm, Venice, Italy , pp 452–457

  13. Ho Q, Gao Y, Rajalingham G, Le-ngoc T (2015) “Robustness of the routing protocol for low-power and lossy networks (RPL) in smart grid’s neighbor-area networks”. In: proceedings of the IEEE International Conference on Communications, ICC, London, pp 826–831

  14. Yang Z, Ping S, Sun H, Aghvami A (2017) “CRB-RPL: A receiver-based routing protocol for communications in cognitive radio enabled smart grid”. IEEE T Veh Technol 66(7):5985–5994

    Article  Google Scholar 

  15. Lemercier F, Montavont N (2018) “Performance evaluation of a RPL hybrid objective function for the smart grid network”.. In: proceedings of the International Conference on Ad Hoc Networks an Wireless, ADHOC-NOW, Saint-Malo France, pp 27–38

  16. Almusaylim ZA, Al-Humam A, Jhanjhi NZ (2020) “Proposing a secure RPL based internet of things routing protocol: A review”. Ad Hoc Networks 101:102096

    Article  Google Scholar 

  17. Wadhaj I, Ghaleb B, Thomson C, Al-Dubai A, Buchanan WJ (2020) “Mitigation mechanisms against the DAO attack on the routing protocol for low power and lossy networks (RPL)”. IEEE, Access 8:43665–43675

    Article  Google Scholar 

  18. Arena A, Perazzo P, Vallati C, Dini G, Anastasi G (2020) Evaluating and improving the scalability of RPL security in the internet of things. Comput Commun 151:119–132

    Article  Google Scholar 

  19. Murali S, Jamalipour A (2020) “A lightweight intrusion detection for sybil attack under mobile RPL in the internet of things”. IEEE Internet Things J 7(1):379–388

    Article  Google Scholar 

  20. Raoof A, Matrawy A, Lung C (2019) “Routing attacks and mitigation methods for rpl-based internet of things”. IEEE Commun Surv Tutor, 21(2):1582–1606

    Article  Google Scholar 

  21. Airehrour D, Gutiérrez J.A., Ray SK (2019) SecTrust-Rpl: A secure trust-aware RPL routing protocol for internet of things. Future Gener Comp Sy 93:860–876

    Article  Google Scholar 

  22. Zaidi SAR, Ghogho M (2012) “Stochastic geometric analysis of black hole attack on smart grid communication networks”. In: proceedings of the IEEE International Conference on Smart Grid Communications, SmartGridComm, Tainan Taiwan, pp 716–721

  23. Mayzaud A, Badonnel R, Chrisment I (2017) “A distributed monitoring strategy for detecting version number attacks in rpl-based networks”. IEEE Trans Netw Ser Mgmt 14(2):472–486

    Article  Google Scholar 

  24. Wallgren L, Raza S, Voigt T (2013) “Routing attacks and countermeasures in the rpl-based internet of things”

  25. Kamgueu PO, Nataf E, Djotio TN (2018) Survey on RPL enhancements: a focus on topology, security and mobility. Comput Commun 120:10–21

    Article  Google Scholar 

  26. Wei X, Wang Q, Wang T, Fan J (2017) “Jammer localization in multi-hop wireless network: A comprehensive survey”. IEEE Commun Surv Tutor 19(2):765–799

    Article  MathSciNet  Google Scholar 

  27. Rappaport TS (1996) Wireless communications - principles and practice. Prentice Hall

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoyu Ji.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supported by National Key R&D Program of China (2018YFB0904900, 2018YFB0904904).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, T., Ji, X. & Xu, W. Jamming-Resilient Backup Nodes Selection for RPL-based Routing in Smart Grid AMI Networks. Mobile Netw Appl 27, 329–342 (2022). https://doi.org/10.1007/s11036-020-01634-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-020-01634-z

Keywords

Navigation