Data traffic interruption detection and mitigation framework for RPL-based WSNs
Abstract
Wireless Sensor Networks (WSN) monitor various aspects of the environment in which they are deployed. Sensor nodes collect and send environment data by neighboring nodes until it reaches the gateway node (root node). WSNs are susceptible to several attacks that totally or partially interrupt the data flow, such as sinkhole, blackhole, gray hole/selective forwarding. We here present an application layer framework for RPL-based WSNs that detects and mitigates the attacks that interrupt data traffic while informing the root node (and the network maintainers) of the suspect nodes by alternative routes, thus preventing interception by attackers. The attacker nodes are then relegated to leaf-nodes by the local reaction of legitimate nodes, as they are prevented from acting as routers, effectively mitigating attacks. By concentrating monitoring functions on the sink, network managers can identify compromised nodes, which can lead to their physical removal. The experiments show that our framework kept the package loss rate at about 2% or lower in most of those tested. Besides managing to maintain a low control message overhead (i.e., 4.67% in a no attack scenario and 9.74% under attack) it was able to provide the network managers with information about the location of the attackers.References
Airehrour, D., Gutierrez, J., and Ray, S. (2017). A trust-aware rpl routing protocol to detect blackhole and selective forwarding attacks. Australian Journal of Telecommunications and the Digital Economy, 5.
Alansari, Z., Anuar, N. B., Kamsin, A., and Belgaum, M. R. (2023). Rplad3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based internet of things. PeerJ Computer Science, 9.
Algahtani, F., Tryfonas, T., and Oikonomou, G. (2021). A reference implemenation for rpl attacks using contiki-ng and cooja. In 2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS), pages 280–286.
Amish, P. and Vaghela, V. (2016). Detection and prevention of wormhole attack in wireless sensor network using aomdv protocol. Procedia Computer Science, 79:700 – 707. Proceedings of International Conference on Communication, Computing and Virtualization (ICCCV) 2016.
Bal, M. (2014). An industrial wireless sensor networks framework for production monitoring. In 2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE), pages 1442–1447.
Chen, B., Li, Y., and Mashima, D. (2018). Analysis and enhancement of rpl under packet drop attacks. In 2018 10th International Conference on Communication Systems Networks (COMSNETS), pages 167–174.
Chowdhury, M. and Kader, M. F. (2013). Security issues in wireless sensor networks: A survey. IFGN, 6:97–116.
Heurtefeux, K., Erdene-Ochir, O., Mohsin, N., and Menouar, H. (2015). Enhancing rpl resilience against routing layer insider attacks. In 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, pages 802–807.
Iova, O., Theoleyre, F., and Noel, T. (2015). Exploiting multiple parents in rpl to improve both the network lifetime and its stability. In 2015 IEEE International Conference on Communications (ICC), pages 610–616.
Jamil, A., Ali, M., and Tharwat, M. (2021). Sinkhole attack detection and avoidance mechanism for rpl in wireless sensor networks. Annals of Emerging Technologies in Computing, 5:94–101.
K, M., Jebadurai, I., Jeba, G., and Jebadurai, J. (2022). Mitigating sinkhole attack in rpl based internet of things environment using optimized k means clustering technique. pages 502–507.
Kumaran, S., Kailasanathan, N., and Mohan, S. (2016). Review of asymmetric key cryptography in wireless sensor networks. 8:859–862.
Maidamwar, P. and Chavhan, N. (2018). A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network.
Muzammal, S. M., Murugesan, R., Jhanjhi, N., Humayun, M., Osman, A., and Abdelmaboud, A. (2022). A trust-based model for secure routing against rpl attacks in internet of things. Sensors, 22:7052.
Oludele, A., Okesola, O., Okokpujie, K., Fowora, D., and Adebiyi, A. (2018). Cryptography and the improvement of security in wireless sensor networks.
Parasuram, A., Culler, D., and Katz, R. (2016). An analysis of the rpl routing standard for low power and lossy networks.
Patel, B., Vasa, J., and Shah, P. (2023). Forwarding neighbor based sink reputed trust based intrusion detection system to mitigate selective forwarding attack in rpl for iot networks. SN Computer Science, 4.
Prathibha, S. R., Hongal, A., and Jyothi, M. P. (2017). Iot based monitoring system in smart agriculture. In 2017 International Conference on Recent Advances in Electronics and Communication Technology (ICRAECT), pages 81–84.
Sharma, D., Dhurandher, S., Kumaram, S., Gupta, K., and Sharma, P. (2022). Mitigation of black hole attacks in 6lowpan rpl-based wireless sensor network for cyber physical systems. Computer Communications, 189.
Singh, R., Singh, J., and Singh, R. (2016). Wrht: A hybrid technique for detection of wormhole attack in wireless sensor networks. Mobile Information Systems, 2016:8354930.
Stephen, R. K. and Arockiam, L. (2018). An enhanced technique to detect sinkhole attack in internet of things. International journal of engineering research and technology, 5.
Sudhakar, B. and Abhinaya, E. (2019). An efficient network discovery storage based resilient packet-forwarding scheme for the mitigation of black hole and wormhole attacks in 6lowpan sensor networks. International Journal of Recent Technology and Engineering, 8(2):1543–1547.
Surendar, M. and Umamakeswari, A. (2016). Indres: An intrusion detection and response system for internet of things with 6lowpan. pages 1903–1908.
Violettas, G., Simoglou, G., Petridou, S., and Mamatas, L. (2021). A softwarized intrusion detection system for the rpl-based internet of things networks. Future Generation Computer Systems, 125:698–714.
Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J., and Alexander, R. (2012). Rpl: Ipv6 routing protocol for low-power and lossy networks. RFC 6550, RFC Editor. [link].
Alansari, Z., Anuar, N. B., Kamsin, A., and Belgaum, M. R. (2023). Rplad3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based internet of things. PeerJ Computer Science, 9.
Algahtani, F., Tryfonas, T., and Oikonomou, G. (2021). A reference implemenation for rpl attacks using contiki-ng and cooja. In 2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS), pages 280–286.
Amish, P. and Vaghela, V. (2016). Detection and prevention of wormhole attack in wireless sensor network using aomdv protocol. Procedia Computer Science, 79:700 – 707. Proceedings of International Conference on Communication, Computing and Virtualization (ICCCV) 2016.
Bal, M. (2014). An industrial wireless sensor networks framework for production monitoring. In 2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE), pages 1442–1447.
Chen, B., Li, Y., and Mashima, D. (2018). Analysis and enhancement of rpl under packet drop attacks. In 2018 10th International Conference on Communication Systems Networks (COMSNETS), pages 167–174.
Chowdhury, M. and Kader, M. F. (2013). Security issues in wireless sensor networks: A survey. IFGN, 6:97–116.
Heurtefeux, K., Erdene-Ochir, O., Mohsin, N., and Menouar, H. (2015). Enhancing rpl resilience against routing layer insider attacks. In 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, pages 802–807.
Iova, O., Theoleyre, F., and Noel, T. (2015). Exploiting multiple parents in rpl to improve both the network lifetime and its stability. In 2015 IEEE International Conference on Communications (ICC), pages 610–616.
Jamil, A., Ali, M., and Tharwat, M. (2021). Sinkhole attack detection and avoidance mechanism for rpl in wireless sensor networks. Annals of Emerging Technologies in Computing, 5:94–101.
K, M., Jebadurai, I., Jeba, G., and Jebadurai, J. (2022). Mitigating sinkhole attack in rpl based internet of things environment using optimized k means clustering technique. pages 502–507.
Kumaran, S., Kailasanathan, N., and Mohan, S. (2016). Review of asymmetric key cryptography in wireless sensor networks. 8:859–862.
Maidamwar, P. and Chavhan, N. (2018). A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network.
Muzammal, S. M., Murugesan, R., Jhanjhi, N., Humayun, M., Osman, A., and Abdelmaboud, A. (2022). A trust-based model for secure routing against rpl attacks in internet of things. Sensors, 22:7052.
Oludele, A., Okesola, O., Okokpujie, K., Fowora, D., and Adebiyi, A. (2018). Cryptography and the improvement of security in wireless sensor networks.
Parasuram, A., Culler, D., and Katz, R. (2016). An analysis of the rpl routing standard for low power and lossy networks.
Patel, B., Vasa, J., and Shah, P. (2023). Forwarding neighbor based sink reputed trust based intrusion detection system to mitigate selective forwarding attack in rpl for iot networks. SN Computer Science, 4.
Prathibha, S. R., Hongal, A., and Jyothi, M. P. (2017). Iot based monitoring system in smart agriculture. In 2017 International Conference on Recent Advances in Electronics and Communication Technology (ICRAECT), pages 81–84.
Sharma, D., Dhurandher, S., Kumaram, S., Gupta, K., and Sharma, P. (2022). Mitigation of black hole attacks in 6lowpan rpl-based wireless sensor network for cyber physical systems. Computer Communications, 189.
Singh, R., Singh, J., and Singh, R. (2016). Wrht: A hybrid technique for detection of wormhole attack in wireless sensor networks. Mobile Information Systems, 2016:8354930.
Stephen, R. K. and Arockiam, L. (2018). An enhanced technique to detect sinkhole attack in internet of things. International journal of engineering research and technology, 5.
Sudhakar, B. and Abhinaya, E. (2019). An efficient network discovery storage based resilient packet-forwarding scheme for the mitigation of black hole and wormhole attacks in 6lowpan sensor networks. International Journal of Recent Technology and Engineering, 8(2):1543–1547.
Surendar, M. and Umamakeswari, A. (2016). Indres: An intrusion detection and response system for internet of things with 6lowpan. pages 1903–1908.
Violettas, G., Simoglou, G., Petridou, S., and Mamatas, L. (2021). A softwarized intrusion detection system for the rpl-based internet of things networks. Future Generation Computer Systems, 125:698–714.
Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J., and Alexander, R. (2012). Rpl: Ipv6 routing protocol for low-power and lossy networks. RFC 6550, RFC Editor. [link].
Published
2025-09-01
How to Cite
SORIANO, Daniel Francis; RUGGIERO, Wilson Vicente.
Data traffic interruption detection and mitigation framework for RPL-based WSNs. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 25. , 2025, Foz do Iguaçu/PR.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2025
.
p. 305-321.
DOI: https://doi.org/10.5753/sbseg.2025.10486.
