sis test and there the number of nodes is defined by
the network administrator. Alternatively, the attacker
may try prevent ANPs reaching the node by means
of a black hole, simply dropping all incoming traf-
fic. Our system tries to mitigate this by broadcasting
ANP packets instead of sending them directly to the
root, thus potentially finding an alternate path of tran-
sit which does not comprise the malicious mote.
6.6 Model Overhead
Since WSN motes have limited memory, we evaluate
the memory overhead of our system in this Section.
We compare a Z1 mote with our anomaly detection
system against a Z1 mote without our anomaly detec-
tion system. For this, we use the unix size command.
The results are given in Table 3.
The results indicate that the addition of our system
increases the size of the executable by around 17%.
The text section increases by 13% and is the largest
absolute contributor to the size increase. data and bss
sections increase by less than 2000 bytes.
Since the mote’s computational power is also very
limited, we evaluate the additional time required for
the added functionality. The time is measured in clock
ticks given by Contiki’s RTIMER NOW function. In
the Zolertia Z1 motes, the corresponding clock has
2
15
ticks per second. For initialization of our algo-
rithm, a node requires on average 197.81 ticks. This
corresponds to 6.04 milliseconds. Frequently called
tasks take on average 208.23 ticks per second and,
thus, take less than 0.64% of the CPU time each sec-
ond. Additionally, we have to modify the packet pro-
cessing of the network stack leading to an increase of
the average time for processing a packet from 22.79
ticks to 25.77 ticks, which corresponds to an increase
of 13.04%.
7 CONCLUSION
In this paper, we present an anomaly detection sys-
tem which is designed to detect single mote attacks
on RPL based-networks on layer 3. This is impor-
tant with these kinds of attacks since they can only
be detected on the application layer after the dam-
age has already been dealt. We implement our system
in C, evaluate it against a set of different topologies,
and show that it can reliably detect three fundamen-
tal attack types while at the same time respecting the
motes’ energy and storage constraints.
REFERENCES
Alexander, R. (2012). RPL: IPv6 Routing Protocol for Low-
Power and Lossy Networks. RFC 6550.
Almomani, I., Kasasbeh, B. A., and Al-Akhras, M. (2016).
WSN-DS: A Dataset for Intrusion Detection Sys-
tems in Wireless Sensor Networks. J. Sensors,
2016:4731953:1–4731953:16.
Bhuse, V. and Gupta, A. (2006). Anomaly intrusion detec-
tion in wireless sensor networks. J. High Speed Netw.,
15(1):33–51.
Bosman, H. H. W. J. (2016). Anomaly detection in net-
worked embedded sensor systems. PhD thesis, Tech-
nische Universiteit Eindhoven.
D’Hondt, A. (2015). RPL attacks framework. Tech-
nical report, Universit catholique de Louvain.
https://github.com/dhondta/rpl-attacks/.
Dunkels, A., Gronvall, B., and Voigt, T. (2004). Contiki - a
lightweight and flexible operating system for tiny net-
worked sensors. In 29th Annual IEEE International
Conference on Local Computer Networks, pages 455–
462.
Hoang, H. T., Eui-Nam, H., and Minho, J. (2015). A
lightweight intrusion detection framework for wire-
less sensor networks. Wireless Communications and
Mobile Computing, 10(4):559–572.
Kaplantzis, S., Shilton, A., Mani, N., and Sekercioglu,
Y. A. (2007). Detecting selective forwarding attacks
in wireless sensor networks using support vector ma-
chines. In ICISSNIP 2007, pages 335–340.
Kumarage, H., Khalil, I., Tari, Z., and Zomaya, A. (2013).
Distributed anomaly detection for industrial wireless
sensor networks based on fuzzy data modelling. Jour-
nal of Parallel and Distributed Computing, 73(6):790
– 806.
Pongle, P. and Chavan, G. (2015). A survey: Attacks on
RPL and 6lowpan in IoT. In 2015 International Con-
ference on Pervasive Computing (ICPC). IEEE.
Rajasegarar, S., Leckie, C., Palaniswami, M., and Bezdek,
J. C. (2006). Distributed anomaly detection in wire-
less sensor networks. In 2006 10th IEEE Singapore
International Conference on Communication Systems.
Raza, S., Wallgren, L., and Voigt, T. (2013). SVELTE:
Real-time intrusion detection in the internet of things.
Ad Hoc Networks, 11(8):2661 – 2674.
Wallgren, L. (2013). Routing Attacks and Countermeasures
in the RPL-Based Internet of Things. International
Journal of Distributed Sensor Networks, 9(8):794326.
Distributed Anomaly Detection of Single Mote Attacks in RPL Networks
385