|
| Titre : |
Topic Secure RPL protocol Approach Secure Communication Protocol for IoT Networks |
| Type de document : |
document électronique |
| Auteurs : |
Oussama abd el ilah Belaiche ; Abderraouf Bennani, Auteur ; Zier,abdelhak, Directeur de thèse |
| Editeur : |
Setif:UFA |
| Année de publication : |
2025 |
| Importance : |
1 vol (106 f .) |
| Format : |
29 cm |
| Langues : |
Anglais (eng) |
| Catégories : |
Thèses & Mémoires:Informatique
|
| Mots-clés : |
Topic Secure
RPL |
| Index. décimale : |
004 Informatique |
| Résumé : |
The Internet of Things (IoT) introduces significant challenges in secure communication due to the lack of computational capacity and energy-efficient devices. RPL (Routing Protocol for Low-power and Lossy Networks) is a traditional routing protocol that is vulnerable to several attacks such as Rank, Sinkhole, and Sybil attacks. This study focuses on enhancing the security of RPL by implementing and testing an enhanced version designed to prevent these vulnerabilities, this version called SRPL protocol stands for secure RPL protocol. In our secure RPL workflow, every node first establishes a shared secret key with their parent using a Diffie-ZKP method that provides confidentiality and publicly authenticates public keys. The parent then sends a secure DIO which contains a significant amount of rank information, and a Schnorr signature for integrity. The child node calculates its rank, sends it to its parent for ratification and signature, then includes the signed rank in all DIOs. Other nodes will only accept DIOs where the signature is about the rank the node was approved for, eliminating fake rank attacks, and trusted routing. Using Contiki OS and the Cooja simulator, a set of experiments was carried out through a series of tests comparing the performance of standard RPL and SRPL under various attack scenarios. Where a set of metrics such as Initialization Time, Message Delay, Packet Delivery were measured, especially in situations involving routing-based attacks.
The results demonstrate that SRPL significantly enhances network security while maintaining comparable performance to the original protocol. This research is a step forward in securing the IoT environments and enabling reliable communication in low-power communication networks. |
| Note de contenu : |
Sommaire
General introduction 10
Chapter 1: Internet of Things (IoT) 12
1.1 Introduction 12
1.2 History of the Internet of Things 1
1.2.1 First ever physical non-computer device connected to the internet 13
1.2.2 First Internet-Enabled Appliance – 1990 13
1.2.3 More Devices Than People – 2008 13
1.3 IoT Working Principle 14
1.3.1 Data Collection / Receiving 15
1.3.2 Data Transmission / Connectivity 16
1.3.3 Data Processing 16
1.3.4 Decision Making / Automation 16
1.3.5 User Interaction / Notification 17
1.4 Types and Applications of IoT 17
1.4.1 Consumer IoT 18
1.4.2 Industrial IoT (IIoT) 18
1.4.3 Commercial IoT 18
1.4.4 Military or Defence IoT 18
1.5 IoT architectures 18
1.5.1 Three-Layer IoT Architecture (Classic IoT Architecture) 18
1.5.2 Five-Layer IoT Architecture 19
1.5.3 Cloud-Based IoT Architecture 20
1.5.4 Edge Computing Architecture 20
1.5.5 Fog Computing Architecture 20
Chapter 2: IoT Security and the RPL Protocol 21
2.1 IoT Security Challenges (and the Importance of Security) 21
○
2.1.1 Why is IoT security important 21
●
2.2 Common Threats in IoT 21
●
2.3 IoT Security Best Practices 22
●
2.4 Introduction to the RPL Protocol 24
●
2.5 In-Depth Analysis of the RPL Protocol 25
○
2.5.1 DODAG Construction 25
○
2.5.2 RPL Control Messages (DIO, DIS, DAO, DAO-ACK) 26
○
2.5.3 RPL Traffic Patterns (MP2P, P2MP, P2P) 30
○
2.5.4 RPL Node Roles 31
○
2.5.5 RPL Operating Modes: Storing vs. Non-Storing 32
○
2.5.6 RPL Objective Functions: OF0 vs. MRHOF 34
○
2.5.7 Rank Management and Loop Avoidance 36
Chapter 3: SRPL – Securing the RPL Protocol 37
●
3.1 RPL Weaknesses and Vulnerabilities 37
●
3.2 Introduction to SRPL (Secure RPL) 42
●
3.3 SRPL Approach, Workflow and Methodology for Securing RPL 43
●
3.4 Detailed File Organigram – SRPL in Contiki 47
○
3.4.1 Modified Core Files for the Implementation of SRPL 48
○
3.4.2 Newly Created and Custom Files for the Implementation of SRPL 49
●
3.5 Tools, Algorithms, and Techniques Used in SRPL 50
○
3.5.1 Development Environment and Operating Systems 50
○ 3.5.2 Tools and Libraries 51
○ 3.5.3 Cryptographic Algorithms 52
○ 3.5.4 Techniques Used in SRPL 52
●
3.6 SRPL Improvements over Standard RPL 53
●
3.7 Why SRPL is an Effective Approach 55
Chapter 4: Results and Evaluation 56
●
4.1 Simulation or Experimental Results 56
○
4.1.1 DZKP based authentication 56
○ 4.1.2 the Schnorr-based authentication 58
●
4.2 Performance Comparison: SRPL vs. Standard RPL 60
●
4.3 Security Comparison: RPL vs SRPL 62
○ 4.3.1 Node Rank Forgery Attack Detection 63
○ 4.3.2 Node Impersonation and Rank Spoofing Detection: RPL vs SRPL 64
●
4.4 Analysis and Interpretation 66
●
4.5 Possible Improvements (S2-RPL) 66
●
4.5.1 S2-RPL Workflow steps 67
●
4.5.2 Why S2-RPL is the Best Approach to Secure RPL 75
● 4.5.3 Prevented Attacks in S2-RPL 76
General Conclusion 78
References 88
Annex I Source Code Additions for Secure RPL (SRPL) 86
Annex II Simulation Code: Malicious Node Behavior 104 |
| Côte titre : |
MAI/1029 |
Topic Secure RPL protocol Approach Secure Communication Protocol for IoT Networks [document électronique] / Oussama abd el ilah Belaiche ; Abderraouf Bennani, Auteur ; Zier,abdelhak, Directeur de thèse . - [S.l.] : Setif:UFA, 2025 . - 1 vol (106 f .) ; 29 cm. Langues : Anglais ( eng)
| Catégories : |
Thèses & Mémoires:Informatique
|
| Mots-clés : |
Topic Secure
RPL |
| Index. décimale : |
004 Informatique |
| Résumé : |
The Internet of Things (IoT) introduces significant challenges in secure communication due to the lack of computational capacity and energy-efficient devices. RPL (Routing Protocol for Low-power and Lossy Networks) is a traditional routing protocol that is vulnerable to several attacks such as Rank, Sinkhole, and Sybil attacks. This study focuses on enhancing the security of RPL by implementing and testing an enhanced version designed to prevent these vulnerabilities, this version called SRPL protocol stands for secure RPL protocol. In our secure RPL workflow, every node first establishes a shared secret key with their parent using a Diffie-ZKP method that provides confidentiality and publicly authenticates public keys. The parent then sends a secure DIO which contains a significant amount of rank information, and a Schnorr signature for integrity. The child node calculates its rank, sends it to its parent for ratification and signature, then includes the signed rank in all DIOs. Other nodes will only accept DIOs where the signature is about the rank the node was approved for, eliminating fake rank attacks, and trusted routing. Using Contiki OS and the Cooja simulator, a set of experiments was carried out through a series of tests comparing the performance of standard RPL and SRPL under various attack scenarios. Where a set of metrics such as Initialization Time, Message Delay, Packet Delivery were measured, especially in situations involving routing-based attacks.
The results demonstrate that SRPL significantly enhances network security while maintaining comparable performance to the original protocol. This research is a step forward in securing the IoT environments and enabling reliable communication in low-power communication networks. |
| Note de contenu : |
Sommaire
General introduction 10
Chapter 1: Internet of Things (IoT) 12
1.1 Introduction 12
1.2 History of the Internet of Things 1
1.2.1 First ever physical non-computer device connected to the internet 13
1.2.2 First Internet-Enabled Appliance – 1990 13
1.2.3 More Devices Than People – 2008 13
1.3 IoT Working Principle 14
1.3.1 Data Collection / Receiving 15
1.3.2 Data Transmission / Connectivity 16
1.3.3 Data Processing 16
1.3.4 Decision Making / Automation 16
1.3.5 User Interaction / Notification 17
1.4 Types and Applications of IoT 17
1.4.1 Consumer IoT 18
1.4.2 Industrial IoT (IIoT) 18
1.4.3 Commercial IoT 18
1.4.4 Military or Defence IoT 18
1.5 IoT architectures 18
1.5.1 Three-Layer IoT Architecture (Classic IoT Architecture) 18
1.5.2 Five-Layer IoT Architecture 19
1.5.3 Cloud-Based IoT Architecture 20
1.5.4 Edge Computing Architecture 20
1.5.5 Fog Computing Architecture 20
Chapter 2: IoT Security and the RPL Protocol 21
2.1 IoT Security Challenges (and the Importance of Security) 21
○
2.1.1 Why is IoT security important 21
●
2.2 Common Threats in IoT 21
●
2.3 IoT Security Best Practices 22
●
2.4 Introduction to the RPL Protocol 24
●
2.5 In-Depth Analysis of the RPL Protocol 25
○
2.5.1 DODAG Construction 25
○
2.5.2 RPL Control Messages (DIO, DIS, DAO, DAO-ACK) 26
○
2.5.3 RPL Traffic Patterns (MP2P, P2MP, P2P) 30
○
2.5.4 RPL Node Roles 31
○
2.5.5 RPL Operating Modes: Storing vs. Non-Storing 32
○
2.5.6 RPL Objective Functions: OF0 vs. MRHOF 34
○
2.5.7 Rank Management and Loop Avoidance 36
Chapter 3: SRPL – Securing the RPL Protocol 37
●
3.1 RPL Weaknesses and Vulnerabilities 37
●
3.2 Introduction to SRPL (Secure RPL) 42
●
3.3 SRPL Approach, Workflow and Methodology for Securing RPL 43
●
3.4 Detailed File Organigram – SRPL in Contiki 47
○
3.4.1 Modified Core Files for the Implementation of SRPL 48
○
3.4.2 Newly Created and Custom Files for the Implementation of SRPL 49
●
3.5 Tools, Algorithms, and Techniques Used in SRPL 50
○
3.5.1 Development Environment and Operating Systems 50
○ 3.5.2 Tools and Libraries 51
○ 3.5.3 Cryptographic Algorithms 52
○ 3.5.4 Techniques Used in SRPL 52
●
3.6 SRPL Improvements over Standard RPL 53
●
3.7 Why SRPL is an Effective Approach 55
Chapter 4: Results and Evaluation 56
●
4.1 Simulation or Experimental Results 56
○
4.1.1 DZKP based authentication 56
○ 4.1.2 the Schnorr-based authentication 58
●
4.2 Performance Comparison: SRPL vs. Standard RPL 60
●
4.3 Security Comparison: RPL vs SRPL 62
○ 4.3.1 Node Rank Forgery Attack Detection 63
○ 4.3.2 Node Impersonation and Rank Spoofing Detection: RPL vs SRPL 64
●
4.4 Analysis and Interpretation 66
●
4.5 Possible Improvements (S2-RPL) 66
●
4.5.1 S2-RPL Workflow steps 67
●
4.5.2 Why S2-RPL is the Best Approach to Secure RPL 75
● 4.5.3 Prevented Attacks in S2-RPL 76
General Conclusion 78
References 88
Annex I Source Code Additions for Secure RPL (SRPL) 86
Annex II Simulation Code: Malicious Node Behavior 104 |
| Côte titre : |
MAI/1029 |
|