Demo: Topological Robustness of RPL with TRAIL † ¨ Martin Landsmann∗ , Peter Kietzmann∗ , Thomas C. Schmidt∗ , and Matthias Wahlisch ∗ iNET RG, HAW Hamburg – Berliner Tor 7, 20099 Hamburg, Germany † CSL, FU Berlin – Takustr. 9, 14195 Berlin, Germany ∗

{martin.landsmann,peter.kietzmann,t.schmidt}@haw-hamburg.de †

[email protected]

Abstract Dependability in IoT networks largely relies on the robustness of a routing protocol such as Routing Protocol for Low-power and Lossy Networks (RPL). Routing is expected to be secure and resilient, in particular against adversaries who try to break into the topology or disturb the overall operation of the network. In this demonstration, we will showcase Trust Anchor Interconnection Loop (TRAIL)—our approach to securing RPL that successfully prevents attacks on the topology and isolates attacking nodes.

Categories and Subject Descriptors C.2.2 [Computer-Communication Networks]: work Protocols—Routing Protocols, Security

Net-

Keywords IoT, routing security, mobile security, topology verification

1

Introduction

The hierarchical composition of a RPL [5] topology binds child nodes to a parent node, while each node calculates its topological position, based on the individual rank inherited from its parent-node. RPL does not define mechanisms to secure and verify the correctness of an announced rank, which renders it being vulnerable to rank forgery and rank spoofing attacks. Using these weaknesses, an adversary can pretend to be in an arbitrary topological position. This allows him to cause a partition of the topology which in the worst case has impact on a greater number of nodes. As result of such an attack, the adversary attracts a large amount of traffic facilitating further attacks on the passing information and payload. To cope with this vulnerability in RPL, we developed TRAIL [3], a lightweight security approach for the IoT. TRAIL allows to validate the complete path from any node to the root of a RPL network with a single traversing message.

In this demonstration, we address the vulnerabilities of RPL (§2) and show the design principles of the TRAIL security measurements (§3). Practically (§4) we show (i) a successful attack on RPL causing the reconstruction of large parts of the topology, and (ii) RPL with applied TRAIL that successfully preventing the attack and isolating the attacker.

2

3 International Conference on Embedded Wireless Systems and Networks (EWSN) 2016 15–17 February, Graz, Austria © 2016 Copyright is held by the authors. Permission is granted for indexing in the ACM Digital Library ISBN: 978-0-9949886-0-7

Vulnerabilities of RPL

The RPL protocol constructs destination oriented directed acyclic graph (DODAG), i.e., trees with a single rootnode. Each node in a DODAG has a rank calculated from its relationship to a parent-node. This rank logically describes the topological distance to the DODAG root. To join a DODAG, a node chooses a parent-node from the existing DODAG and computes its own rank by increasing the received parent rank. Then it announces its rank to offer being a parent for other joining nodes. Thus, ranks rise monotonically with topological distance to the DODAG root and a low rank indicates being a beneficial parent-node to choose. While RPL forbids being endlessly greedy to prevent oscillation between two nodes, it allows a node to switch to a more beneficial parent and adjust its rank accordingly. Figure 1(a) depicts a healthy DODAG. The red dots are the nodes with their rank placed in brackets. The arrows show the parentchild communication in the DODAG. An adversary can exploit the rank based construction and maintenance of a DODAG. By announcing a beneficial low rank, neighbor-nodes will choose the adversary as their new parent. In turn they will recalculate and announce their new lower rank too, attracting their neighbors. This cascades throughout the DODAG until the deceived nodes and the remaining unaffected nodes are in equilibrium. Exploiting this weakness, enables to pull a major amount of traffic towards an attacker to apply sinkhole attacks [4]. Periodical switching its rank and triggering DODAG maintenance operations on numerous nodes, enables to disturb or even interrupt a RPL topology. Figure 1(b) shows the DODAG after Attacker announced a low rank and successfully deceived its neighbors.

TRAIL in a nutshell

A node that requires validation of a complete path to the root node creates a TRAIL validation message extending it with a nonce using Bloom filter [2] compression. The TRAIL validation message is forwarded to its parent node. Upon reception, the parent node validates if rank of the child

219

(a) RPL DODAG before the attack

(b) Partitioned RPL DODAG after the attack

Figure 1. Successful attack on RPL node is not lower than the own rank. A violation of monotonic rank order indicates either a RPL inconsistency or an attack, causing the parent node to drop the TRAIL validation message. If the monotonic rank order is proven, the parent node creates a Bloom filter from a chosen nonce and prepends it to the TRAIL validation message before forwarding it to its parent node. Upon reception of multiple validation messages, a node validates the monotonic rank order for each child. The node merges all Bloom filters of the TRAIL validation messages aligned on the last prepended filters, i.e., the one inserted by its child nodes, resulting in a new single TRAIL validation message. Note: Bloom filters can be short and correspond to the number of child nodes. The TRAIL validation message propagating to the root node contains all nonces from one topological distance to the root node in a single Bloom filter. The position of each filter in the message represents the logical distance to the root node. The root node validates the monotonic rank order and merges the TRAIL validation messages. Then it signs the TRAIL validation message and forwards it back to all child nodes. When a child node receives a signed TRAIL validation message, it first verifies the signature and than probes if its nonce is in the compressed Bloom filter at its assumed topological position in the message. On success, the complete path to the root node is trustworthy to forward traffic. The signed TRAIL validation message is than forwarded to all child nodes. Whenever this validation fails the path to the root node is assumed as compromised and the validation message is dropped. Any inconsistency is detected immediately in both direction by the node receiving the message. Since propagation of a compromised TRAIL validation message is stopped, the adversary is directly identified and isolated from the topology. Path validation using TRAIL ensures a monotonic topology structure where inconsistencies are directly detected. TRAIL successfully protects against rank spoofing attacks, protecting the topology from partitioning. Attacking nodes are reliably identified and isolated from the topology just by the procedure of TRAIL. The characteristics of TRAIL strengthens resilience against attacks and inconsistencies,

220

which is the base for dependable communication in the IoT. A comprehensive analysis of TRAIL can be found in [3].

4

Demo

In our demonstration, we showcase the topological robustness of RPL using TRAIL. For the sensor nodes we use Atmel SAM R21 Xplained Pro boards running RIOT-OS [1]. We present the following 2 demo scenarios: 1. We setup several sensor nodes to build a DODAG with multihop routes using RPL without TRAIL. After the DODAG converges, an arbitrary node starts an attack by announcing a more beneficial rank, i.e., the rank of the root-node. This will result in a partition of the DODAG. Then we activate TRAIL on all nodes and monitor healing of the DODAG and isolation of the attacker. 2. We setup all nodes as before, but activate TRAIL before starting RPL. This demonstrates RPL protection with TRAIL during the DODAG bootstrap phase. Then again we choose an attacking node that will announce a beneficial rank. Afterwards we start RPL on all nodes to construct a DODAG. We will observe that the attacking node cannot successfully attract child nodes and eventually will remain isolated.

Acknowledgments This work is funded by the Federal Ministry of Education and Research (BMBF) of Germany in the Project SAFEST.

5

References

[1] E. Baccelli, O. Hahm, M. G¨unes, M. W¨ahlisch, and T. C. Schmidt. RIOT OS: Towards an OS for the Internet of Things. In Proc. of the 32nd IEEE INFOCOM. Poster, 2013. IEEE Press. [2] B. H. Bloom. Space/Time Trade-offs in Hash Coding with Allowable Errors. Commun. ACM, 13(7):422–426, July 1970. [3] H. Perrey, M. Landsmann, O. Ugus, M. W¨ahlisch, and T. C. Schmidt. TRAIL: Topology Authentication in RPL. In Proc. of Intern. Conf. on Embedded Wireless Systems and Networks (EWSN ’16), New York, NY, USA, Feb. 2016. ACM. [4] K. Weekly and K. Pister. Evaluating Sinkhole Defense Techniques in RPL Networks. In Network Protocols (ICNP), 2012 20th IEEE International Conference on, pages 1–6, Nov. 2012. [5] T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik, J. Vasseur, and R. Alexander. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550, IETF, March 2012.

Demo: Topological Robustness of RPL with TRAIL

C.2.2 [Computer-Communication Networks]: Net- work Protocols—Routing Protocols, Security. Keywords. IoT, routing security, mobile security, topology verifica .... sage is stopped, the adversary is directly identified and iso- lated from the topology. Path validation using TRAIL ensures a monotonic topol- ogy structure where ...

589KB Sizes 4 Downloads 204 Views

Recommend Documents

Estimating Production Functions with Robustness ...
The literature on estimating production functions on panel data using control functions has focused mainly ... ∗We thank James Levinsohn for providing us with the Chilean manufacturing industry survey data. We also ...... analytical in the paramete

Scaling RPL to Dense and Large Networks with ...
link stats, RPL info,. IPv6 nbr info. routing protocol, but it has been designed based on data col- lection protocols such as CTP [10]. In application domains such as smart offices and facility management, there may be hundreds, or even thousands, of

Reasoning with Topological and Directional Spatial ...
Oct 5, 2010 - For any ε > 0, Ns has a rectangle solution {ri}n .... and m2 = m3 = [2,6] × [2,6]. ..... Advances in Spatial Databases (SSD-95), pages 292–309.

Robustness of Temporal Logic Specifications - Semantic Scholar
1 Department of Computer and Information Science, Univ. of Pennsylvania ... an under-approximation to the robustness degree ε of the specification with respect ...

Chromatin Topological Transitions
Page 1 ... 3)) In particular, it is often hard to make the difference between direct ..... 4) G. J. Narlikar, H. Y. Fan and R. E. Kingston, Cell 108 (2002), 475.

Delaunay Triangulation Demo - GitHub
by Liu jiaqi & Qiao Xin & Wang Pengshuai. 1 Introduction. Delaunay triangulation for a set P of points in a plane is a triangulation DT(P) such that no point in P is ...

Demo CIC.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.

ESHRE RPL Guideline_28112017_FINAL.pdf
ln = 4(3 ) + 3 x y. B1. M1. A1ft. forms equation of line. ft only on their gradient. (ii) x y = → = += 0.5 ln 4 3 3 9.928. y = 20 500. M1. A1. correct expression for lny. (iii) Substitutes y and rearrange for 3x. Solve 3x. = 1.150. x = 0.127. M1. M

Dynamic Measure of Network Robustness
communication networks and synthetically generated networks with power-law degree distribution topology are presented in this work. I. INTRODUCTION.

Kauffman, Knot Logic and Topological Quantum Computing with ...
Kauffman, Knot Logic and Topological Quantum Computing with Majorana Fermions.pdf. Kauffman, Knot Logic and Topological Quantum Computing with ...

Azalea Trail - City of Mobile
Call 251-208-6029 for more information. www.mandastudios.com ... Arthur Outlaw Convention Center. 18. Mobile Civic Center. 19. GM&O Building. 20. Church ...

Chromatin Topological Transitions - LPTMC
This leads to both compaction and topological deformation of the DNA by one negative turn per nucleosome. 2). Acting both as a compaction and regulatory tool, nucleosomes must be reasonably stable while keeping some dynamic properties to allow transi

Chromatin Topological Transitions
(c) In the three-state model of chromatin fiber, chromatin fiber in front .... whole scenario can be conveniently experimented at desk by using an old XXth century ...

Robustness of Traveling Waves in Ongoing Activity of ...
Feb 29, 2012 - obtained from K. FS /SS. C/A, where prime indicates the complex ..... Kitano M, Kasamatsu T, Norcia AM, Sutter EE (1995) Spatially distributed.

Equilibrium distributions of topological states in circular ...
data were obtained by direct simulation of this conditional distribution. Each ..... Jenkins, R. (1989) Master's thesis (Carnegie Mellon Univ., Pittsburgh). 36. ... Darcy, I. K. & Sumners, D. W. (1998) in Knot Theory (Banach Center Publications),.

On the Robustness of Simple Indoor MANET ...
the overwhelming majority of MANET research is evaluated using computer ... to the best of our knowledge – has not been identified or evaluated in previous .... both laptops were configured to ping each other; otherwise, a new pair of loca-.

Existing C++ Compile-Time Reflection Demo Of ... - Andrew Tomazos
May 21, 2014 - Write a constexpr variable template angloname that behaves like a string ..... constexpr auto angloname

Large Vocabulary Noise Robustness on Aurora4 - International ...
While porting models to noisy environments, the distortion of pa- rameters augments the confusability of models, and therefore cre- ates decoding errors.

jadwal uas rpl 1.pdf
حدد زوايا مركزية أخرى في هذا الشكل . o. C. A. D. B. O. التي تحصر القوس AB. #. Whoops! There was a problem loading this page. Retrying... Whoops! There was a problem loading this page. Retrying... jadwal uas rp

On the robustness of laissez-faire
E-mail address: [email protected] (C. Phelan). 0022-0531/$ – see front .... Agents may well send reports that reveal (correctly) that tastes and wealths are independent. Then ..... transfer is akin to receiving a service. This is like a (richer than 

Design and Robustness Evaluation of an H-Infinity ...
designed controller is compared with an existing phase lead controller and shows ... M Akhtar, Project Director, Electrical & Automation Project Directorate,.

Robustness of Hurst Exponent Estimates from ... - Kaare Mikkelsen
The basis of this study is that the signal variance stemming from neural activity (thus ... script uses circular embedding of the covariance matrix at H > 0.5, and ...

Names of Tropics Trail Primates.pdf
Page 1 of 1. Names of Tropics Trail Primates. Colobus Monkey. - Oscar. - Malaki. - DJ (female). -. DeBrazza. - Otis. - Mashama (Shama; female). - Jasiri.