Internet DRAFT - draft-zhang-roll-rpl-intrusion-defence
draft-zhang-roll-rpl-intrusion-defence
Network Working Group Lan Zhang
Internet Draft Gang Feng
Intended status: Standards Track Shuang Qin
Expires: May 2014 UESTC
November 27, 2013
Intrusion Detection System for Low-Power and Lossy Networks
draft-zhang-roll-rpl-intrusion-defence-00.txt
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
This document may contain material from IETF Documents or IETF
Contributions published or made publicly available before November 10,
2008. The person(s) controlling the copyright in some of this
material may not have granted the IETF Trust the right to allow
modifications of such material outside the IETF Standards Process.
Without obtaining an adequate license from the person(s) controlling
the copyright in such materials, this document may not be modified
outside the IETF Standards Process, and derivative works of it may
not be created outside the IETF Standards Process, except to format
it for publication as an RFC or to translate it into languages other
than English.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on May 27, 2014.
Zhang et al. Expires May 27, 2014 [Page 1]
Internet-Draft IDSs for LLNs November 2013
Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents carefully,
as they describe your rights and restrictions with respect to this
document. Code Components extracted from this document must include
Simplified BSD License text as described in Section 4.e of the Trust
Legal Provisions and are provided without warranty as described in
the Simplified BSD License.
Abstract
This document specifies intrusion detection systems (IDSs) as the
second line of defence, to secure the Routing Protocol for Low-power
and Lossy Networks (RPL).
Table of Contents
1. Introduction ................................................ 4
2. Terminology ................................................. 5
3. Protocol Overview ........................................... 5
4. Detection methodologies...................................... 6
5. System architectures of IDSs ................................ 7
5.1. Stand-alone IDS......................................... 7
5.1.1. Centralized MN..................................... 8
5.1.2. Distributed MN..................................... 8
5.1.3. Estimation of stand-alone IDS ..................... 9
5.2. Distributed and Cooperative IDS ........................ 9
5.3. Distributed and Hierarchical IDS ...................... 10
5.4. Mobile Agent IDS....................................... 10
6. Detection data ............................................. 11
6.1. Detection source location ............................. 11
6.2. Collection frequency................................... 11
7. Intrusion response ......................................... 12
8. A general design of IDS for ETX intrusion detection......... 12
8.1. ETX intrusion ......................................... 12
8.2. Design of the IDS for ETX Intrusion ................... 13
9. Security Considerations..................................... 15
10. IANA Considerations........................................ 15
11. Conclusions ............................................... 15
12. References ................................................ 16
12.1. Normative References.................................. 16
12.2. Informative References................................ 16
13. Acknowledgments .......................................... 17
Zhang et al. Expires May 27, 2014 [Page 2]
Internet-Draft IDSs for LLNs November 2013
Authors' Addresses ............................................ 18
Zhang et al. Expires May 27, 2014 [Page 3]
Internet-Draft IDSs for LLNs November 2013
1. Introduction
With the advance of networked electronic devices and wireless
communications, network can connect human-to-human, human-to-thing
and even thing-to-thing. The network environment often consists of
large quantities of devices, which usually have constrained resources
such as limited processing capability, short battery life [Le2012].
As a consequence, the network links may have poor quality in
transmitting packets. IETF ROLL working group was formed to specify
routing protocol for such Low-Power and Lossy Networks (LLNs), and
the working group defined a Routing Protocol for LLNs (RPL) [RFC6550].
Due to the salient features of LLNs devices and the inherent
vulnerabilities of RPL, the security design to defence RPL intrusions
is a significant challenge, especially for mission-critical
applications such as military tasks and disaster recovery.
As a broad conception, intrusion generally refers to the unauthorized
or unapproved actions that attempt to compromise the system.
Intruders can usually be classified into external and internal
intruders. External intruders have no right to access the network,
which are outsiders with limited intrusion impact. Once they obtain
the authorization to become internal intruders, they have more severe
damage and as legitimate nodes they are hard to be detected. Usually,
internal intruders pass the network access control mechanism by
compromising a legitimate node or by deploying malicious nodes.
Security design to defence network intrusions involves three main
components, including prevention, detection and mitigation
[Farooqi2012]. Traditional cryptography technique is the typical
intrusion prevention technique, as the first line of defence to
prevent intrusions before their occurrence. However, the intruders
may break the preventive security techniques. For example, external
intruders compromise the encryption key to become internal. In this
case, the intrusion detection technique as the second line of defence
can be activated. Intrusion detection system (IDS) is designed to
remedy the consequence of intrusions before the system resources are
disclosed. IDSs also provide suspicious intrusion information, which
might be useful in intrusion mitigation, the third line of defence.
IDSs can be used to detect both internal and external intruders.
Since RPL devices have weak security nature for tamper resistance,
intrusions cannot be completedly solved by prevention techniques.
Thus IDSs are of great significance for RPL security.
This document specifies IDSs for RPL, which is weak in defensing
intrusions. This document is dedicated to analyzing the detection
methodologies, system architectures, detection data and intrusion
Zhang et al. Expires May 27, 2014 [Page 4]
Internet-Draft IDSs for LLNs November 2013
response of IDSs with some available promotions in different
scenarios.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119 [RFC2119].
In this document, these words will appear with that interpretation
only when in ALL CAPS. Lower case uses of these words are not to be
interpreted as carrying RFC-2119 significance.
This document adopts the terminology defined in [RFC6550], and
additionally uses terminology from [ROLL-TERMS], with the following
introducing terminologies:
Node: An element of a low-power, lossy network that may be a router
or a host.
Sink node: The root node of a Destination Oriented Directed Acyclic
Graphs (DODAG). Usually, sink node is the LoWPAN Border Router (LBR),
which connects to the internet.
Monitor node (MN): A special node type, which is in charge of
monitoring job in IDSs. MNs can be LLNs devices or high-performance
devices based on the design of IDSs.
3. Protocol Overview
RPL is a distance vector IPv6 routing protocol designed for LLNs
[RFC6550]. Due to the special characteristics of LLNs, such as
resource-constrained devices, poor link quality and unattended
deployed environment, RPL mainly focuses on self-organizing
capability, such as auto-optimized topology construction, self-repair
and self-maintenance, etc.
RPL is composed of one or more DODAG. Each DODAG can be regarded as
many nodes connected to an LBR, so as to minimize the cost from any
node in the network to reach the LBR. LBRs are connected together and
linked to the Internet through a backbone or transit link. The DODAG
construction is based on Object Function (OF), which can minimize the
particular metrics in different application scenarios. To construct
the DODAG, RPL defines a set of new ICMPv6 messages, including DODAG
Information Solicitation (DIS), DODAG Information Object (DIO), and
Destination Advertisement Object (DAO) [RFC4443]. The sink node first
broadcasts DIO messages with information related to the DODAG, such
Zhang et al. Expires May 27, 2014 [Page 5]
Internet-Draft IDSs for LLNs November 2013
as Rank (which is generally the distance to the backbone network), OF,
DODAG-ID, etc. The parent nodes have lower Rank. After receiving DIO
message, neighbors calculate their Rank and decide whether to join
this DODAG. If a node joins this DODAG, it will send back a DAO
message and broadcast DIO message with its rank, OF, the DODAG it
belongs to, etc. Nodes can also ask for graph information by sending
DIS messages. All nodes repeat this process until each node joins a
DODAG, which means the auto-optimized topology construction is
completed.
RPL has local repair mechanism to achieve self-healing. Any
inconsistency between the routing decision for a packet and the rank
relationship between the two nodes indicates a possible loop. On
receiving such a packet, a node can institutes a local repair
operation, [RFC6550] which can be operated by poisoning mechanism or
the change of DODAG ID.
RPL also has timer trickle mechanism, which enables the self-healing
and self-maintenance in a highly robust, energy efficient, simple and
scalable manner. Each node has a timer to trigger its DIO messages,
which increases exponentially. RPL sets the smallest and the biggest
possible interval separately. Once network topology fluctuation
exists, such as the parent node is unreachable, the timer is reset to
the minimized interval value [RFC6206].
The self-organizing capability of RPL makes it more vulnerable to
internal intrusions. Many strict rules, which help to maintain
optimal RPL network state, may be utilized by the intruders.
Neighbors are unaware of the inside process changes of the
compromised nodes and continue to communicate as normal. Thus the RPL
self-optimized state can be broken.
4. Detection methodologies
Functionally, IDSs have three detection methodologies, which are
signature-based, anomaly-based and specification-based. This section
details the detection methodologies, analyzes their advantages and
disadvantages, and then gives some promotions.
o Signature-based detection: In this methodology, previously known
intrusions are profiled as a reference, and the data is matched
with the known intrusion signatures with a low false alarm rate.
The disadvantage of this detection type is that it cannot be
applicable to detect novel intrusions without well-defined
[Tseng2003].
Zhang et al. Expires May 27, 2014 [Page 6]
Internet-Draft IDSs for LLNs November 2013
o Anomaly-based detection: This detection methodology is based on
statistical behavior, which focuses on normal network behaviors
rather than intrusion behaviors with a defined threshold to
distinguish the compromised nodes. It can detect new intrusions
without well-defined. However, the profiled normal behaviors must
be updated, which may increase the load of nodes. Moreover the
dynamic system may emerge legitimate but previously unseen
behavior, which can produces a high degree of false alarms.
According to the behavioral model processing nature, G Teodoro et
al. [Garcia2009] further divide anomaly-based IDS into three
categories, namely statistical based, knowledge based and machine
learning based, which may be included in the future documents.
o Specification-based detection: This methodology also detects
attacks by comparing network behavior deviations. It can detect
new intrusions. Rather than previous network behaviors in anomaly-
based detection, it needs to manually extract and craft to
characterize legitimate system behavior, so as to avoid high
degree of false alarms. But the development of specifications
might be time-consuming. Specification-based IDS has been applied
to privileged programs, applications, and several network
protocols [Tseng2003].
Comparing the above three detection methodologies, the third one has
advantages in LLNs. This document promotes specification-based
detection methodology to deal with RPL intrusions. But in case of
constrined time, the other two methodologies can also be applied.
Thus the applied detection methodology can be adjusted based on the
application scenarios.
5. System architectures of IDSs
System architecture [Farooqi2012] is crucial to optimize each module
of IDSs, and it also directly affects the performance of IDSs. Thus
this document pays more attention to the analysis of IDS system
architecture. This section specifies three types of system
architecture for RPL in different application scenarios.
5.1. Stand-alone IDS
The basic idea of stand-alone IDS is that each MN independently
completes intrusion detection based on information collected by its
own. In stand-alone IDS, MNs can be classified into centralized and
distributed. The following part in this section will discuss the two
types of stand-alone IDS.
Zhang et al. Expires May 27, 2014 [Page 7]
Internet-Draft IDSs for LLNs November 2013
5.1.1. Centralized MN
In stand-alone IDS with centralized MN, each RPL node is viewed as an
MN. The network nodes perform RPL as well as monitoring. Watchdog
machine [Shakshuki2011] is a typical centralized MN machine.
This kind of architecture scheme obviously aggravates the load of RPL
nodes, which seriously affects the lifetime of RPL node. Due to the
resource-constrained RPL characteristics, this kind of system
architecture should be applied with caution.
5.1.2. Distributed MN
Distributed MNs are designed for intrusion detection for a certain
monitor area. This kind of IDS architecture deploys multiple MNs to
cover the network. The proper backbone of MNs should be accomplished
with minimal MNs, and each RPL node should be in the range of at
least one MN.
Distributed MN with FSM is first proposed by University of California,
which is promoted for stand-alone IDS with distributed MN in this
document. An FSM is implemented in each MN, which is designed based
on the intrusion detection. MNs passively listen to RPL packets and
extract information to store in their monitor lists. Each MN has a
monitor list, which is updated dynamically. MNs apply the FSM to
monitor the behavior flow of nodes in its monitoring area by
analyzing data recorded on their monitor list.
Considering the resource-constrained RPL characteristics, the
additional monitoring job may incurr big processing cost. Distributed
MN device can be designed to high-performance device or LLNs device,
and the MNs using LLNs devices can also be RPL node or another
special kind of node. Thus there exist three types of distributed MN
as follows.
1. As LLNs devices, this type of MN also works as normal RPL nodes.
They perform RPL as well as monitor tasks. As battery powered LLNs
devices, it is hard to replenish once the energy runs out. This
can leads to the network malfunctioning earlier. But this scheme
can decrease the network cost to a great extent. Moreover unlike
traditional security mechanism, MN does not require any harsh
encryption algorithm or operation. This scheme is promoted to be
applied to applications with simple security problems, such as
simple civil scenarios.
2. As LLNs devices, this type of MN does not perform any RPL
operation. As another special kind of node, it only monitors the
network security, and it can be applied to defense some
Zhang et al. Expires May 27, 2014 [Page 8]
Internet-Draft IDSs for LLNs November 2013
complicated attacks by the complex algorithm. The disadvantages
are that the additional nodes increase network cost and the
interferences among nodes are also increased. This scheme can be
applied to applications with high security requirements or
potential security issues, such as military scenarios.
3. As the high-performance device, this kind of MN can detect
intrusions without limitations of resource constraints. It is
benefitial to detect intrusions effectively, with the most
expensive cost. Also the special devices may lead to more
intrusions to them. But it is still a useful scheme for some
serious mission-task scenarios.
5.1.3. Estimation of stand-alone IDS
The advantage of stand-alone IDS is robust, since each MN can
complete intrusion detection independently. When some MNs become
invalid, others can operate as normal. This system architecture is
relatively simple, which is easy for deployment and implementation.
The stand-alone IDS with distributed MN also considers the energy
consuming problem of RPL. Three kind of schemes to different
application scenarios are designed.
The stand-alone IDS architecture also has some disadvantages. The MNs
do not cooperate or share information with others, which limits the
detection efficiency. Moreover, since the MNs are equal and operate
their IDS dependently, the detection results might have some
collisions.
5.2. Distributed and Cooperative IDS
In distributed and cooperative IDS, intrusion detection is
accomplished by the cooperation of MNs. Each MN runs an IDS agent to
participate in the intrusion detection and response to the overall
network. This kind of IDS applies two levels coordinate architecture
with neighbor-agent and local-agent. The deployment of agents and the
agent device type can refer to stand-alone IDS (in 5.1).
When a local-agent detects an intrusion with sufficient evidence, it
can alert intrusion independently. While the local-agent detects an
intrusion with weak or inconclusive evidence, it can initiate a
global detection procedure by interactive connection with neighbor-
agents. With the exchanges of data and responses, the globe response
will be delivered to each agent.
The distributed and cooperative IDS is suitable to the flat network
infrastructures, such as a DODAG in RPL. Thus, it can be applied to
small-scale network. The distributed and cooperative IDS solves the
Zhang et al. Expires May 27, 2014 [Page 9]
Internet-Draft IDSs for LLNs November 2013
low detection efficiency problem in stand-alone IDS, but with a more
complicated architecture.
5.3. Distributed and Hierarchical IDS
In large-scale RPL network, the network topology is usually composed
of several DODAGs, and the sink node of each DODAG connects together
to the internet. Thus RPL can be regarded as a multi-layer network.
The distributed and hierarchical IDS is promoted for such clustering
network. This IDS is of two level architecture. As the cluster heads
(CH), sink nodes are CH-agents. And the local-agents are deployed and
designed according to stand-alone IDS (in 5.1).
Each local-agent operates independently, and reports the detection
results to CH-agents. CH-agents are responsible to monitor the member
nodes and make the global intrusion detection decisions. CH-agents
complete the association and aggregation of alerts in the DODAG, and
the neighbor CH-agents can coordinate to complete the cross-DODAG
intrusion detection.
Since local-agent and CH-agent coordinate architecture does not need
the coordination of neighbor-agents, it decreases the risk of
eavesdropping. But the globe response by CH-agents might cause a long
delay.
5.4. Mobile Agent IDS
Mobile agent [Li2012] is assigned to perform monitoring task in a
selected node, based on specific tasks. The mobile agents
cooperatively perform the intrusion detection. And the selection of
agents might be changed after the task is completed or after a
certain time period. The movement of agents is usually evolved from
RPC methods through data duplication. The mobile agent saves its own
state, transfers the saved state to the new node, and resumes
execution from the saved state. The mobile agent is characterized by
the following attributes.
o Mobility: Mobile agents can actively migrate between nodes for
asynchronous execution at any time during their execution. This
makes them powerful to deal with distributed RPL applications.
Also the mobility characterize can increase the efficiency of IDS.
o Autonomy: Mobile agents operate independently without any manual
intervention, and use preprogrammed knowledge in order to execute
general tasks. They are also expected to be able to analyze the
changes of a network and take intuitive action accordingly.
Zhang et al. Expires May 27, 2014 [Page 10]
Internet-Draft IDSs for LLNs November 2013
The above attributes virtually improve the function of IDS in RPL.
However the mobile agent IDS architecture also has several
disadvantages, and this document only gives some sketchy introduction,
the detailed discussion may be included in the future. The main
disadvantages are listed below.
o Resource consumption: The IDSs may consist of a large amount of
codes, which might be very time-consuming for transfering codes
between agent nodes. Moreover the additional codes will cause a
resource overhead. Since all nodes are prepared to serve as a
mobile agent, the additional processes increase energy consumption.
The resource consumption problem must be effectively solved in RPL
before its application.
o Decisional confliction: Since the mobile agents usually have equal
status, the confliction is still hard to avoid.
o Security: The mobility and autonomy characteristics of mobile
agent also make it unsecure from intrusions.
6. Detection data
In aformentioned system architecture of IDSs, MNs defense intrusions
by detecting system data. This section mainly discusses the source of
data and the data detection frequency.
6.1. Detection source location
The source of detection data can be classified into three groups,
including host-based, network-based and hybrid.
o Host-based IDS: When the IDS only concern events on the host, the
source of detection data is host-based. This kind of detection can
be achieved in application or system log files on the host.
o Network-based IDS: The IDS places sniffers on interconnection
equipment, captures and examines the transmitting packets. It can
detect packets, payload or other information within the packet.
o Hybrid IDS: The hybrid IDS is a combination of host-based and
network-based IDS.
6.2. Collection frequency
Considering the resource-constrained characteristic of LLNs devices,
data detection frequency can be adjusted according to different
application scenarios. For real-time applications, MNs should detect
Zhang et al. Expires May 27, 2014 [Page 11]
Internet-Draft IDSs for LLNs November 2013
the data continuously or in a high frequency. In the contrary, in
applications such as weather prediction, a proper detection interval
is indispensable.
7. Intrusion response
As the second line of defence, IDSs do not do preventive tasks and
the IDS reacts when an intrusion is detected. This document simply
introduces the following intrusion response, and the detailed action
can be discussed in future docuemnts.
o The system may generate an alarm to inform the administrator or
the sink node, so as to decide the reaction to the intrusion.
o The system may react in the corrective action, such as designing a
new rule in a firewall or disconnection of suspicious connections,
which can prevent the identical future intrusions.
o A mitigation method may be induced as the third line of defence in
a comprehensive system, and the mitigation detection can stop the
intrusion with information provided by the IDS.
8. A general design of IDS for ETX intrusion detection
The above document analyzes several aspects of IDS with promotions
based on different application scenarios. The self-organizing
capability makes RPL be vulnerable to intrusions, especially the new
type of internal intrusions. Thus this section gives an example of
designing the IDS to defense ETX intrusion with single intruder,
which is a new type of internal intrusion in RPL.
8.1. ETX intrusion
RPL constructs auto-optimized topology based on metric and constrains.
In RPL with ETX metric[De2005], node chooses preferred parent based
on integrated ETX value, which is composed by neighbor ETX value from
received DIO messages and counted link ETX value to that neighbor.
Usually, node selects neighbor with smaller integrated ETX value as
preferred parent. ETX intrusion can be developed by single intruder
or multiple collaborated intruders. This section only deals with ETX
intrusion with single intruder.
The intruder advertises DIO messages with fake ETX value, which
misleads its neighbors to change preferred parents. It can form
redundant route paths and break RPL auto-optimized topology, which
degrades the network performance in many important QoS aspects, such
as energy consumption, throughput and delay. The intruders only need
Zhang et al. Expires May 27, 2014 [Page 12]
Internet-Draft IDSs for LLNs November 2013
to ignore the legitimate ETX detection by itself, and then work as
normal. Moreover, in LLNs devices, the cryptography techniques cannot
be applied to examine DIO message, and thus neighbors cannot judge
the legitimation of ETX value from received DIO messages. As a
consequence, the ETX intrusion is easy to start and hard to detect.
8.2. Design of the IDS for ETX Intrusion
Assume that ETX intrusion with single intruder is happened in a
stable network environment without other intrusions, and the network
initialization is secure. The IDS to defense this intrusion is
designed as follows.
o Detection methodology: The IDS applies specification-based
detection methodology, which can detect novel intrusions with a
lower false alarm rate.
o System architecture: The IDS applies stand-alone system
architecture, which is simple and effective to defense single
intruder without collaboration. Considering RPL resource-
constrained characteristic, stand-alone IDS employs distributed MN
with FSM architecture. Since the network environment is stable, MN
devices employ RPL devices, which do RPL jobs as well as the
monitoring work.
The deployment of distributed MNs is accomplished with minimal MNs
before network initialization, and each RPL node is in the range
of at least one MN. Thus MNs can collect the complete information
of neighbors to detect intrusions.
In distributed MN with FSM, MNs passively listen to RPL packets,
extract and record useful information in a dynamically updated
list. The FSM operates the detection based on that list. Since
specification-based IDSs detect intrusions by comparing network
behavior deviations, before designing FSM, normal RPL behaviors
should be discussed. In stable network environment, link ETX
values are nearly the same, and the integrated ETX value is only
depended on neighbor ETX value. Thus the selection of preferred
parent is only decided on neighbor ETX value. In secure RPL
environment, neighbor ETX values may change but without leading
massive topology fluctuation. Thus, in a stable RPL environment,
when a node broadcasts DIO message with decreased ETX value, the
number of its child nodes might be increased. If the increase
number of child nodes exceeds a threshold, that node must be an
ETX intruder.
Zhang et al. Expires May 27, 2014 [Page 13]
Internet-Draft IDSs for LLNs November 2013
According to above discussions, the list of MNs should include
useful information of all neighbors, including ETX value from DIO
messages, preferred parent from DAO messages, and child node
number counted by list item of preferred parent. There are six
states in FSM, including the start when network initialize, the
route path setup/change, the packets detection, the invalid route,
the network fluctuation and the ETX intrusion alarm.
1. When MN first receives a DIO message, its state will move to
topology setup/change state, in Step 2. The MN will record ETX
value, and build an entry for that node in its list.
2. In topology setup/change state, when MN sniffs DIO or DAO
message, its state is transited to packets detection state, in
Step 3.
When the list record shows that parent and child ETX
relationship is broken (parent node has bigger ETX value), the
state of FSM is transited to invalid route state, in Step 4.
When the recorded ETX value is decreased, the FSM state is
transited to network fluctuation state, in Step 5.
3. In packets detection state, if the node is new, MN will build
an entry and record information of that node to its list.
Otherwise the MN will update the corresponding ETX value from
DIO message or preferred parent information from DAO message.
Then the FSM state is transitted back to topology setup/change
state, in Step 2.
4. In invalid route state, an RPL local repair mechanism is needed
to recover the network topology.
5. In network fluctuation state, a time counter will be started
for that node to examine asynchronously consequences. Before
the timer expiration, if the number of child nodes increases to
exceed a threshold, the FSM state will move to ETX intrusion
alarm state, in Step 6. The threshold is depended on the
network environment and the network scale.
6. In ETX intrusion alarm state, MN broadcasts ETX intrusion alarm
packets. There might be a feedback mechanism to make sure that
the intrusion is noted by all neighbors.
o Detection data: The detection data is network-based, and the
detection frequency is the same as data packet sending frequency.
Zhang et al. Expires May 27, 2014 [Page 14]
Internet-Draft IDSs for LLNs November 2013
o Intrusion response: The IDS reacts in a corrective action. When
ETX intrusion is detected, the MN will broadcast alarms. Nodes
which receive the alarm will mark the intruder to avoid intrusion
again, and then check their parent list. If the intruder exists in
the parent list, it will delete the intruder and reselect its
preferred parent immediately. In this way, the intruder cannot
start ETX intrusions anymore.
9. Security Considerations
In RPL, the network security solution is largely limited by its
resource-constrained characteristic. This document specifies IDSs as
the second line to defence intrusions. However it does not take much
consideration on the security of IDSs, since RPL nodes may do not
have enough capability in using prevention detection methods to
protect the IDS process.
This document proposes three type MN devices (in 5.1.2), and the
latter two kinds may have the ability to adopt the prevention machine.
Some simple security machines such as simple authentication, or other
novel machines such as sequence authentication, can be considered to
be applied to secure the IDSs.
10. IANA Considerations
This memo includes no request to IANA.
11. Conclusions
This document specifies IDSs as the second line of defence for RPL.
Due to RPL self-organizing characteristics, it is necessary to design
IDS to defence intrusions, especially the internal intrusions. This
document first analyzes three type detection methodologies, and
promotes the specification-based method to RPL. Then it mainly
discusses the system architecture of IDSs. In stand-alone IDS, the
distributed MN with FSM architecture is promoted with three types of
MN device in different RPL applications. The distributed and
cooperative IDS is promoted to flat network infrastructure, such as a
DODAG. The distributed and hierarchical IDS is promoted in large-
scale network with several DODAGs. And there are also some sketchy
introductions on mobile agent IDS, which may be discussed in the
future. The document also specifies detection data with data source
and collection frequency. In addition, this document gives the
intrusion responses to complete the IDS process. To explicitly show
the design of IDSs, this document gives an example to apply IDS to
defense ETX intrusion with single intruder, which is a novel internal
Zhang et al. Expires May 27, 2014 [Page 15]
Internet-Draft IDSs for LLNs November 2013
RPL intrusion. At last this document presents some security
considerations for IDSs in RPL.
12. References
12.1. Normative References
[RFC6550] Winter, T., Ed., Thubert, P., Ed., Brandt, A., Hui,
J.,Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur,
JP., and Alexander, R., "RPL: IPv6 Routing Protocol for
Low-Power and Lossy Networks", RFC 6550, March 2012.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC4443] Conta, A., Deering, S., and Gupta, M., "Internet Control
Message Protocol (ICMPv6) for the Internet Protocol Version
6 (IPv6) Specification", RFC 4443, March 2006.
12.2. Informative References
[ROLL-TERMS]
Vasseur, JP., "Terminology in Low power And Lossy Networks",
Work in Progress, March 2013.
[Farooqi2012] Farooqi, A. H., and Khan, F. A. "A survey of intrusion
detection systems for wireless sensor networks", Proc.
International Journal of Ad Hoc and Ubiquitous Computing
2012 PP. 69-83.
[Le2012] Le, A., Loo, J., Lasebae, A., Aiash, M., and Luo, Y.
"6LoWPAN: a study on QoS security threats and
countermeasures using intrusion detection system approach",
Proc. International Journal of Communication Systems 2012
pp. 1189-1212.
[Tseng2003] Tseng, C, Y., Balasubramanyam, P., Ko, C.,
Limprasittiporn, R., Rowe, J. and Levitt, K. "A
specification-based intrusion detection system for AODV"
Proc. the 1st ACM workshop on Security of ad hoc and sensor
networks 2003 pp. 125-134.
[Shakshuki2011] Shakshuki, E., Kang, N., and Sheltami, T. "EAACK-A
Secure Intrusion-Detection System for MANETs", Proc.
Industrial ElectronicsIEEE Transactions 2013 pp. 1089-1098.
Zhang et al. Expires May 27, 2014 [Page 16]
Internet-Draft IDSs for LLNs November 2013
[Garcia2009]Garcia-Teodoro, P., Diaz-Verdejo, J., et al. "Anomaly-
based network intrusion detection: Techniques, systems and
challenges", Proc. computers & security 2009 PP. 18-28.
[Li2012] Li, Y., and Qian, Z. "Mobile agents-based intrusion
detection system for mobile ad hoc networks",
Proc. Innovative Computing & Communication 2010 Intl Conf
on and Information Technology & Ocean Engineering, 2010
Asia-Pacific Conf 2010 pp. 145-148.
[De2005] De, Couto, D. S., Aguayo, D., Bicket, J., and Morris, R. "A
high-throughput path metric for multi-hop wireless routing",
Proc. Wireless Networks 2005 PP. 419-434.
13. Acknowledgments
This document was prepared using 2-Word-v2.0.template.dot.
Zhang et al. Expires May 27, 2014 [Page 17]
Internet-Draft IDSs for LLNs November 2013
Authors' Addresses
Lan Zhang, Gang Feng, Shuang Qin
National Key Laboratory of Science and Technology on Communications
UESTC (University of Electronic Science and Technology of China)
No.2006, Xiyuan Ave, West Hi-Tech Zone
Chengdu, Sichuan, P.R.China 611731
Phone: +86 151-9663-7390
Email: zhanglan_uestc@163.com
fenggang@uestc.edu.cn
blueqs@uestc.edu.cn
Zhang et al. Expires May 27, 2014 [Page 18]