EdDSA-Enhanced RPL Security Framework for IoT with Lightweight Attack Mitigation and Protocol Validation
Keywords:
EdDSA, RPL Security, IoT, Lightweight Cryptography, Attack Mitigation, Protocol Validation.Abstract
The proliferation of the Internet of Things (IoT) demands robust and lightweight security solutions to protect communication within resource-constrained networks. The Routing Protocol for Low-Power and Lossy Networks (RPL), widely adopted in IoT, is vulnerable to a range of attacks, including spoofing, replay, and selective forwarding. To address these challenges, this paper introduces an EdDSA-Enhanced RPL Security Framework designed to ensure secure communication with minimal computational and communication overhead. The proposed framework leverages the EdDSA cryptographic scheme for node authentication, secure session key generation using ECDH, and signature-based integrity verification. It incorporates mechanisms for replay attack detection, spoofing prevention via nonce freshness, and reputation-based forwarding validation to mitigate selective forwarding attacks. The methodology is structured in six key stages: cryptographic initialization, node registration, session key establishment, secure routing, spoofing mitigation, and formal validation. Simulations were conducted using Contiki-NG and the Cooja emulator to evaluate protocol performance in realistic IoT scenarios. Additionally, security validation was performed using AVISPA with OFMC and CL-AtSe backends, which confirmed the protocol's resistance to various threats. Experimental results demonstrate a significant improvement over existing protocols in terms of execution time, energy consumption, communication cost, and detection accuracy. The proposed EdDSA-based framework offers an efficient, secure, and scalable solution for safeguarding IoT networks operating under RPL.
Downloads
References
Adarbah, H. Y., Moghadam, M. F., Maata, R. L. R., Mohajerzadeh, A., & Al-Badi, A. H. (2022). Security challenges of selective forwarding attack and design a secure ECDH-based authentication protocol to improve RPL security. IEEE Access, 11, 11268-11280.
Gawade, A. and Shekokar, N., 2020. Lightweight Secure Technology Future of Internet of Things. Internet of Things, Smart Computing and Technology: A Roadmap Ahead, pp.305-321.
Özalp, A.N., Albayrak, Z., Çakmak, M. and ÖzdoĞan, E., 2022, June. Layer-based examination of cyber-attacks in IoT. In 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (pp. 1-10). IEEE.
Barua, A., Al Alamin, M.A., Hossain, M.S. and Hossain, E., 2022. Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey. IEEE Open Journal of the Communications Society, 3, pp.251-281.
Bang, A.O. and Rao, U.P., 2022. Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices. The Journal of Supercomputing, 78(8), pp.11111-11137.
Priyanka, R. and Reddy, S., 2022. An End-to-End Security Aware WSN Approach with Localization & Authentication and Data Exchange Security. Int. Trans. J. Eng. Manag. Appl. Sci. Technol, 13, pp.1-15.
Adil, M., Menon, V.G., Balasubramanian, V., Alotaibi, S.R., Song, H., Jin, Z. and Farouk, A., 2022. Survey: Self-empowered wireless sensor networks security taxonomy, challenges, and future research directions. IEEE Sensors Journal, 23(18), pp.20519-20535.
Tropea, M., Spina, M.G., De Rango, F. and Gentile, A.F., 2022. Security in wireless sensor networks: A cryptography performance analysis at mac layer. Future Internet, 14(5), p.145.
Aydin, H., Gormus, S. and Aydin, B., 2024. A decentralized proxy-JRC authentication system for scalable IETF 6TiSCH networks. IEEE Access.
Dongre, N., Atique, M., Shaik, Z.A. and Raut, A.D., 2022, January. A survey on security issues and secure frameworks in internet of things (iot). In 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (pp. 173-181). IEEE.
Tian, S. and Vassilakis, V.G., 2023. On the efficiency of a lightweight authentication and privacy preservation scheme for MQTT. Electronics, 12(14), p.3085.
Patel, S.K., 2023. Attack detection and mitigation scheme through novel authentication model enabled optimized neural network in smart healthcare. Computer Methods in Biomechanics and Biomedical Engineering, 26(1), pp.38-64.
Gupta, S. and Saxena, S., 2022. Lightweight Cryptographic Techniques and Protocols for IoT. In Internet of Things: Security and Privacy in Cyberspace (pp. 55-77). Singapore: Springer Nature Singapore.
Aljrees, T., Kumar, A., Singh, K.U. and Singh, T., 2023. Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm. Sensors, 23(19), p.8090.
Rutravigneshwaran, P. and Anitha, G., 2023. Security model to mitigate black hole attack on internet of battlefield things (iobt) using trust and k-means clustering algorithm. International Journal of Computer Networks and Applications, 10(1).
Alasmary, H., 2023. RDAF-IIoT: Reliable device-access framework for the industrial Internet of Things. Mathematics, 11(12), p.2710.
Shapla, K., 2022. A Lightweight Intrusion Detection Framework Using Focal Loss Variational Autoencoder for Internet of Things (Doctoral dissertation, University of Malaya (Malaysia)).
Rizzardi, A., Sicari, S. and Coen-Porisini, A., 2022. Analysis on functionalities and security features of Internet of Things related protocols. Wireless Networks, 28(7), pp.2857-2887.
Bradbury, M., Jhumka, A., Watson, T., Flores, D., Burton, J. and Butler, M., 2022. Threat-modeling-guided trust-based task offloading for resource-constrained Internet of Things. ACM Transactions on Sensor Networks (TOSN), 18(2), pp.1-41.
Majumder, S., Ray, S., Sadhukhan, D., Dasgupta, M., Das, A.K. and Park, Y., 2023. ECC-EXONUM-eVOTING: A novel signature-based e-voting scheme using blockchain and zero knowledge property. IEEE Open Journal of the Communications Society, 5, pp.583-598.
Majumder, S., Ray, S., Sadhukhan, D., Khan, M.K. and Dasgupta, M., 2022. ESOTP: ECC‐based secure object tracking protocol for IoT communication. International Journal of Communication Systems, 35(3), p.e5026.
Rao, V. and Prema, K.V., 2021. A review on lightweight cryptography for Internet-of-Things based applications. Journal of Ambient Intelligence and Humanized Computing, 12(9), pp.8835-8857.
Al Qathrady, M., Almakdi, S., Alshehri, M.S. and Alqhtani, S.M., 2023. Security Challenges in Multi-UAV Systems Communication Network. In Unmanned Aerial Vehicles Applications: Challenges and Trends (pp. 289-321). Cham: Springer International Publishing.
Adarbah, H.Y., Moghadam, M.F., Maata, R.L.R., Mohajerzadeh, A. and Al-Badi, A.H., 2022. Security challenges of selective forwarding attack and design a secure ECDH-based authentication protocol to improve RPL security. IEEE Access, 11, pp.11268-11280.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.