Skip to main content

Advertisement

Log in

SAMP-RPL: secure and adaptive multipath RPL for enhanced security and reliability in heterogeneous IoT-connected low power and lossy networks

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The Internet of things (IoT) is made up of huge sets of networked low-power devices. Regardless of the application specificities, those devices are generally tasked to provide highly important services that can be reached out through the internet. Communications with IoT networks cannot be achieved without the support of efficient underlying routing schemes. However, the constraints related to scarce resources, as well as the wireless and lossy nature of IoT networks may tremendously affect the communications reliability. Consequently, routing efficiency could be affected. Moreover, the exposure to internal and external cyber-attacks, especially those that threaten data and service availability, complicates even further routing and security missions in such a constrained context. In this paper, we propose an efficient solution that enhances both the communications reliability and security in the heterogeneous IoT-enabled low power and lossy networks. The solution relies on three variants of adaptive and secure multipath routing for IPv6 routing protocol for low-power and lossy networks (RPL). To the best of our knowledge, this is the first solution that deals with multipath routing security issue for RPL protocol, in IoT contexts. The proposed solution is evaluated with Cooja simulator of Contiki OS. The assessment results show obviously the effectiveness of the proposed solution for improved communication reliability and security, at low costs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  • Ahrar EM, Nassiri M, Theolerye F (2019) Multipath aware scheduling for high reliability and fault tolerance in low power industrial networks. J Netw Comput Appl 142:25–36

    Article  Google Scholar 

  • Almusaylim ZA, Jhanjhi NZ, Alhumam A (2020) Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP. Sensors 20(21):1–25

    Article  Google Scholar 

  • Alsukayti IS (2020) The support of multipath routing in IPv6-based internet of things. Int J Electr Comput Eng 10(2):2208–2220

    Google Scholar 

  • Angappan A, Saravanabava TP, Sakthivel P, Vishvaksenan KS (2020) Novel Sybil attack detection using RSSI and neighbor information to ensure secure communication in WSN. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-02276-5

    Article  Google Scholar 

  • Aouiz AA, Boukli-Hacen S, Lorenz P, Gilg M (2018) Network life time maximization of the AOMDV protocol using nodes energy variation. Netw Protoc Algorithms 10(2):1–22

    Google Scholar 

  • Arena AP, Perazzo C, Vallati G, Dini G, Anastasi G (2020) Evaluating and improving the scalability of RPL security in the Internet of things. Comput Commun 151:119–132

    Article  Google Scholar 

  • Boudouaia MA, Pacha AA, Abouaissa A, Lorenz P (2020) Security against rank attack in RPL protocol. IEEE Netw 34(4):133–139

    Article  Google Scholar 

  • Canbalaban E, Sen S (2020) A cross-layer intrusion detection system for RPL-based internet of things. In: International conference on ad-hoc networks and wireless, Italy, pp 214–227

  • Ciabattoni L, Foresi G, Monteriù A, Pepa L, Proietti Pagnotta D, Spalazzi L, Verdini F (2019) Real time indoor localization integrating a model based pedestrian dead reckoning on smartphone and BLE beacons. J Ambient Intell Hum Comput 10:1–12

    Article  Google Scholar 

  • Estrin AC, Jenschke TL, Papadopoulos JZ, Hamelin JIA, Montavont N (2020) Thorough investigation of multipath techniques in RPL based wireless networks. In: IEEE symposium on computers and communications (ISCC), France, pp 1–7

  • Farzaneh B, Koosha M, Boochanpour E, Alizadeh E (2020) A new method for intrusion detection on RPL routing protocol using fuzzy logic. In: 6th international conference on web research (ICWR), Iran, pp 245–250

  • Jenschke TL, Koutsiamanis RA, Papadopoulos GZ, Montavont N (2018) Multi-path selection in RPL based on replication and elimination. In: International conference on ad-hoc networks and wireless, France, pp 15–26

  • Lodhi MA, Rehman R, Khan MM, Hussain FB (2015) Multiple path RPL for low power lossy networks. In: IEEE Asia Pacific conference on wireless and mobile (APWiMob), Indonesia, pp 279–248

  • Ma G, Li X, Pei Q, Li Z (2017) A security routing protocol for internet of things based on RPL. In: IEEE International conference on networking and network applications (NaNA), Kathmandu, pp 209–213

  • Muzammal SM, Murugesan RK, Jhanjhi NZ, Jung LT (2020) SMTrust: proposing trust-based secure routing protocol for RPL attacks for IoT applications. In: International conference on computational intelligence (ICCI), Malaysia, pp. 305–310

  • Pu C (2020) Sybil attack in RPL-based internet of things: analysis and defenses. IEEE Internet Things J 7(6):4937–4949

    Article  Google Scholar 

  • Qureshi KN, Ranaa SS, Gwanggil-Jeoncd AA (2020) A novel and secure attacks detection framework for smart cities industrial internet of things. Sustain Urban Areas 61:1–33

    Google Scholar 

  • Sengul C, Kirby A (2020) Message queuing telemetry transport (MQTT)-TLS profile of authentication and authorization for constrained environments (ACE) framework, IETF draft

  • Seyfollahi A, Ghaffari A (2020a) A lightweight load balancing and route minimizing solution for routing protocol for low-power and lossy networks. Comput Netw 179:1–21

    Article  Google Scholar 

  • Seyfollahi A, Ghaffari A (2020b) Reliable data dissemination for the internet of things using Harris hawks optimization. Peer-to-Peer Netw Appl 13:1886–1902

    Article  Google Scholar 

  • Shelby Z, Hartke K, Bormann C (2014) The Constrained application protocol (CoAP), request for comments 7252

  • Suhail S, Hussain R, Abdellatif M, Pandey SR, Khan A, Hong CS (2020) Provenance-enabled packet path tracing in the RPL-based internet of things. Comput Netw 173:1–14

    Article  Google Scholar 

  • Tang W, Ma X, Huang J, Wei J (2016) Toward improved RPL: a congestion avoidance multipath routing protocol with time factor for wireless sensor networks. J Sens. https://doi.org/10.1155/2016/8128651

    Article  Google Scholar 

  • Verma A (2020) Security of RPL based 6LoWPAN networks in the internet of things: a review. IEEE Sens J 20(11):5666–5690

    Article  Google Scholar 

  • Verna A, Ranga V (2020) Mitigation of DIS flooding attacks in RPL-based 6LoWPAN networks. Trans Emerg Telecommun Technol 31(2):1–25

    Google Scholar 

  • Winter T, Thubert P, Brandt A, Hui J, Kelsey R, Levis P, Pister K, Struik R, Vasseur JP, Alexander R (2012) RPL: IPv6 routing protocol for low-power and lossy networks, request for comments 6550

  • Yousefi HHN, Kavian Y, Mahmoudi A (2021) A Markov chain model for IEEE 802.15.4 in time critical wireless sensor networks under periodic traffic with reneging packets. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-021-02984-6

    Article  Google Scholar 

  • Zahra FT, Zamanv N (2020) Cooja simulator step-by-step manual 1–67

  • Zheng Y, Nguyen UT, Nguyen HL (2012) Data overhead impact of multipath routing for multicast in wireless mesh networks. In: Third FTRA international conference on mobile, ubiquitous, and intelligent computing, Canada, pp 1–4

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Somia Sahraoui.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sahraoui, S., Henni, N. SAMP-RPL: secure and adaptive multipath RPL for enhanced security and reliability in heterogeneous IoT-connected low power and lossy networks. J Ambient Intell Human Comput 14, 409–429 (2023). https://doi.org/10.1007/s12652-021-03303-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-021-03303-9

Keywords

Navigation