Your browser does not support JavaScript!

DDoS attack aware environment with secure clustering and routing based on RPL protocol operation

DDoS attack aware environment with secure clustering and routing based on RPL protocol operation

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Circuits, Devices & Systems — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Routeing protocol for low-power and lossy networks (RPL) are widely used in dynamic wireless sensor network. Several types of researches worked on RPL and designed hybrid energy-efficient cluster-parent-based RPL, queue utilisation (QU)-RPL, improved RPL, attack detection RPL etc. to support from vulnerable threats, provide efficient routeing and balance dynamic nodes in the network. Previous research findings dealt with certain limitations and problems. In this study, a new coordinative-balanced clustering algorithm is proposed which is enabled to balance destination-oriented directed acyclic graph (DODAG) that is formed in each cluster. Pruning of nodes from DODAG effectively maintains cluster with minimised complexity. This study also resolves the problem of two common security attacks such as distributed denial of service attack (DDoS) and version number attack. Then, enriched-ant colony optimisation is used for DDoS detection and a secure route is chosen to perform data transmission. At the instance of selecting best parent for forwarding data, the authors use residual energy and scoring factor. Scoring factor of each node denotes the legitimacy to be selected as the best parent. Finally, results obtained from Network Simulator 3 indicate better performances on the following metrics: packet delivery ratio, end-to-end delay, node death minimisation, packet loss rate and power consumption.


    1. 1)
      • 36. Lee, J.-G., Kim, B.-K., Jang, S.-B., et al: ‘Accuracy enhancement of RSSI-based distance estimation by applying Gaussian filter’, Indian J. Sci. Technol., 2016, 9, (20), pp. 15.
    2. 2)
      • 18. Gaddour, O., Koubâa, A., Chaudhry, S., et al: ‘Simulation and performance evaluation of DAG construction with RPL’. Int. Conf. Communications and Networking, Hammamet, Tunisia, 2012, pp. 18.
    3. 3)
      • 1. Lamaazi, H., Benamar, N., Jara, A.J.: ‘RPL-based networks in static and mobile environment: a performance assessment analysis’, J. King Saud Univ., Comput. Inf. Sci., 2017, 30.
    4. 4)
      • 5. Iova, O., Theoleyre, F., Watteyne, T., et al: ‘The love–hate relationship between IEEE 802.15.4 and RPL’, IEEE Commun. Mag., 2017, 55, (1), pp. 188194.
    5. 5)
      • 21. Barcelo, M., Correa, A., Vicario, J.L., et al: ‘Addressing mobility in RPL with position assisted metrics’, IEEE Sens. J., 2016, 16, (7), pp. 21512161.
    6. 6)
      • 33. Mayzaud, A., Badonnel, R., Chrisment, I.: ‘Detecting version number attacks in RPL-based networks using a distributed monitoring architecture’. Int. Conf. Network and Service Management, Yangon, Myanmar, 2016, pp. 127135.
    7. 7)
      • 24. Iuchi, K., Matsunaga, T., Toyoda, K., et al: ‘Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network’. Asia-Pacific Conf. Communications, Kyoto, Japan, 2015, pp. 299303.
    8. 8)
      • 4. Qorany, K., Fadeel, A., El Sayed, K.: ‘ESMRF: enhanced stateless multicast RPL forwarding for IPv6-based low-power and lossy networks’. Proc. 2015 Workshop on IoT Challenges in Mobile and Industrial Systems, Florence, Italy, 2015, pp. 1924.
    9. 9)
      • 17. Gara, F., Saad, L.B., Ayed, R.B., et al: ‘RPL protocol adapted for healthcare and medical applications’. Int. Wireless Communications and Mobile Computing Conf., Dubrovnik, Croatia, 2015, pp. 690695.
    10. 10)
      • 8. Yang, Z., Ping, S., Sun, H., et al: ‘CRB-RPL: a receiver-based routing protocol for communications in cognitive radio enabled smart grid’, IEEE Trans. Veh. Technol., 2017, 66, (7), pp. 59855994.
    11. 11)
      • 30. Zhang, W., Han, G., Feng, Y., et al: ‘IRPL: an energy efficient routing protocol for wireless sensor networks’, J. Syst. Archit., 2017, 75.
    12. 12)
      • 22. Palani, U., Alamelumangai, V., Nachiappan, A.: ‘Hybrid routing and load balancing protocol for wireless sensor network’, Wirel. Netw., 2016, 22, (8), pp. 26592666.
    13. 13)
      • 12. Kaur, T., Saluja, K.K., Sharma, A.K.: ‘DDOS attack in WSN: a survey’. Int. Conf. Recent Advances and Innovations in Engineering, Jaipur, India, 2016, pp. 15.
    14. 14)
      • 20. Zhang, W., Li, L., Han, G., et al: ‘E2HRC: an energy-efficient heterogeneous ring clustering routing protocol for wireless sensor networks’, IEEE Access, 2017, 5, pp. 17021713.
    15. 15)
      • 14. Dhumane, A., Bagul, A., Kulkarni, P.: ‘A review on routing protocol for low power and lossy networks IoT’, Int. J. Adv. Eng. Glob. Technol., 2015, 3, (12), pp. 14401444.
    16. 16)
      • 7. Lee, T.-H., Xie, X.-S., Chang, L.-H.: ‘RSSI-based IPv6 routing metrics for RPL in low-power and lossy networks’. IEEE Int. Conf. Systems, Man, and Cybernetics, San Diego, CA, USA, 2014, pp. 17141719.
    17. 17)
      • 31. Ray, A., De, D.: ‘Energy efficient clustering protocol based on K-means (EECPK-means)-midpoint algorithm for enhanced network lifetime in wireless sensor network’, IET Wirel. Sens. Syst., 2016, 6, (6), pp. 181191.
    18. 18)
      • 26. Le, A., Loo, J., Lasebae, A., et al: ‘The impact of rank attack on network topology of routing protocol for low-power and lossy networks’, IEEE Sens. J., 2013, 13, (10), pp. 36853692.
    19. 19)
      • 10. Zhang, L., Feng, G., Qin, S.: ‘Intrusion detection system for RPL from routing choice intrusion’. IEEE Int. Conf. Communication Workshop, London, UK, 2015, pp. 26522658.
    20. 20)
      • 9. Zhao, M., Shwe, H.Y., Chong, P.H.J.: ‘Cluster-parent based RPL for low-power and lossy networks in building environment’. IEEE Consumer Communications and Networking Conf., Las Vegas, NV, USA, 2015, pp. 779784.
    21. 21)
      • 13. Rghioui, A., Khannous, A., Bouhorma, M.: ‘Denial-of-service attacks on 6LoWPAN-RPL networks: threats and an intrusion detection system proposition’, J. Adv. Comput. Sci. Technol., 2014, 3, (2), pp. 143153.
    22. 22)
      • 3. Oikonomou, G., Phillips, I., Tryfonas, T.: ‘IPv6 multicast forwarding in RPL-based wireless sensor networks’, Wirel. Pers. Commun., 2013, 73, (3), pp. 10891116.
    23. 23)
      • 32. Kim, H.-S., Kim, H., Paek, J., et al: ‘Load balancing under heavy traffic in RPL routing protocol for low power and lossy networks’, IEEE Trans. Mob. Comput., 2016, 16, pp. 114.
    24. 24)
      • 28. Kasinathan, P., Pastrone, C., Spirito, M.A.: ‘Denial-of-service detection in 6LoWPAN based Internet of things’. Int. Conf. Wireless and Mobile Computing, Networking and Communications, Montréal, Canada, 2013, pp. 600607.
    25. 25)
      • 34. Chen, C.-M., Hsu, S.-C., Lai, G.-H.: ‘Defense denial-of-service attacks on IPv6 wireless sensor networks’, Genet. Evol. Comput., 2016, 387, pp. 319326.
    26. 26)
      • 11. Mayzaud, A., Badonnel, R., Chrisment, I.: ‘A distributed monitoring strategy for detecting version number attacks in RPL-based networks’, IEEE Trans. Netw. Serv. Manage., 2017, 14, (2), pp. 472786.
    27. 27)
      • 27. Perrey, H., Landsmann, M., Ugus, O., et al: ‘TRAIL: topology authentication in RPL’, Netw. Internet Archit., 2015.
    28. 28)
      • 19. Zhao, M., Ho, I.W.-H., Chong, P.H.J.: ‘An energy-efficient region-based RPL routing protocol for low-power and lossy networks’, IEEE Internet Things J., 2016, 3, (6), pp. 13191333.
    29. 29)
      • 6. Pavković, B., Theoleyre, F., Duda, A.: ‘Multipath opportunistic RPL routing over IEEE 802.15.4’. Proc. 14th ACM Int. Conf. Modeling, Analysis and Simulation of Wireless and Mobile Systems, Miami, Florida, USA, 2011, pp. 179186.
    30. 30)
      • 25. Dvir, A., Holczer, T., Buttyan, L.: ‘VeRA – version number and rank authentication in RPL’. IEEE Eighth Int. Conf. Mobile Ad-Hoc and Sensor Systems, Valencia, Spain, 2011, pp. 709714.
    31. 31)
      • 16. Clausen, T., Herberg, U., Philipp, M.: ‘A critical evaluation of the IPv6 routing protocol for low power and lossy networks (RPL)’. Int. Conf. Wireless and Mobile Computing, Networking and Communications, Wuhan, China, 2011, pp. 365372.
    32. 32)
      • 15. Tian, H., Qian, Z., Wang, X., et al: ‘QoI-aware DODAG construction in RPL-based event detection wireless sensor networks’, J. Sens., 2017, 2017.
    33. 33)
      • 35. Oliveira, L.M.L., Rodrigues, J.J.P.C., de Sousa, A.F., et al: ‘Network admission control solution for 6LoWPAN networks based on symmetric key mechanisms’, IEEE Trans. Ind. Inf., 2016, 12, pp. 110.
    34. 34)
      • 29. Zhao, M., Chong, P.H.J., Chan, H.C.B.: ‘An energy-efficient and cluster-parent based RPL with power-level refinement for low-power and lossy networks’, Comput. Commun., 2016, 104.
    35. 35)
      • 23. Iova, O., Theoleyre, F., Noel, T.: ‘Exploiting multiple parents in RPL to improve both the network lifetime and its stability’. IEEE Int. Conf. Communications, London, UK, 2015, pp. 610616.
    36. 36)
      • 2. Zhang, T., Li, X.: ‘Evaluating and analyzing the performance of RPL in contiki’. Proc. First Int. Workshop on Mobile Sensing, Computing and Communication, Philadelphia, Pennsylvania, USA, 2014, pp. 1924.

Related content

This is a required field
Please enter a valid email address