Analysis of Routing Attacks on RPL based 6LoWPAN Networks

被引:11
作者
Verma, Abhishek [1 ]
Ranga, Virender [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
来源
INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING | 2018年 / 11卷 / 08期
关键词
Routing attack; 6LoWPAN; RPL; Security; Simulation; Internet of Things; NetSim;
D O I
10.14257/ijgdc.2018.11.8.05
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the advancement of IPv6 support in constrained wireless nodes, the new networking paradigm has emerged which is known as the Internet of Things. This paradigm is open to many threats because of its open and constrained nature. Routing attacks are one of the major threats to the Internet of Things which aim to disrupt normal routing operations of the network. In this paper, we analyze some well-known routing attacks (Sinkhole, Blackhole, Selective forwarding, Sybil, Clone ID, HELLO flooding and Local Repair) and show their effect on network throughput. Simulation of routing attacks is done using the state-of-the-art Internet of Things simulator, NetSim tool.
引用
收藏
页码:43 / 56
页数:14
相关论文
共 50 条
  • [11] Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths
    Bang, Ankur
    Rao, Udai Pratap
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (02) : 2489 - 2505
  • [12] Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT
    Abhishek Verma
    Virender Ranga
    [J]. Wireless Personal Communications, 2019, 108 : 1571 - 1594
  • [13] Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT
    Verma, Abhishek
    Ranga, Virender
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (03) : 1571 - 1594
  • [14] Residual Energy based RE-RPL for 6LoWPAN
    Sarode, Ketki P.
    Solapure, Sharwari S.
    [J]. 2019 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET 2019): ADVANCING WIRELESS AND MOBILE COMMUNICATIONS TECHNOLOGIES FOR 2020 INFORMATION SOCIETY, 2019, : 351 - 354
  • [15] A secure routing protocol for low power and lossy networks based 6LoWPAN networks to mitigate DIS flooding attacks
    Abhinaya, E. V.
    Sudhakar, B.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [16] Path Extension Analysis of Peer-to-Peer Communications in Small 6LoWPAN/RPL Sensor Networks
    Melakessou, Foued
    Engel, Thomas
    [J]. 2013 IEEE 21ST INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS & SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (MASCOTS 2013), 2013, : 303 - 307
  • [17] A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things
    Al-Amiedy, Taief Alaa
    Anbar, Mohammed
    Belaton, Bahari
    Bahashwan, Abdullah Ahmed
    Hasbullah, Iznan Husainy
    Aladaileh, Mohammad Adnan
    AL Mukhaini, Ghada
    [J]. INTERNET OF THINGS, 2023, 22
  • [18] mRPL plus : A mobility management framework in RPL/6LoWPAN
    Fotouhi, Hossein
    Moreira, Daniel
    Alves, Mario
    Yomsi, Patrick Meumeu
    [J]. COMPUTER COMMUNICATIONS, 2017, 104 : 34 - 54
  • [19] Analyzing and Evaluating the Performance of 6LoWPAN and RPL Using CONTIKI
    Mishra, Shambhavi
    Singh, Pawan
    Arora, Deepak
    Agrawal, Krishna Kant
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 1100 - 1105
  • [20] Analysis of Blackhole Attack in RPL-based 6LoWPAN Network: A Case Study
    Rajasekar, V. R.
    Rajkumar, S.
    [J]. 2021 28TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS, AND SYSTEMS (IEEE ICECS 2021), 2021,