Performance Evaluation of Mobile RPL-Based IoT Networks under Hello Flood Attack

被引:2
作者
Hkiri, Amal [1 ]
Alqurashi, Sami [2 ]
Ben Bahri, Omar [2 ]
Karmani, Mouna [1 ]
Faraj, Hamzah [2 ]
Machhout, Mohsen [1 ]
机构
[1] Univ Monastir, Fac Sci Monastir, Phys Dept, Elect & Microelect Lab, Monastir 5000, Tunisia
[2] Taif Univ, Coll Ranyah, Dept Sci & Technol, POB 11099, Taif 21944, Saudi Arabia
关键词
RPL; Hello Flood attack; mobility; group mobility models; MODELS;
D O I
10.3390/electronics13112226
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The RPL protocol is essential for efficient communication within the Internet of Things (IoT) ecosystem, yet it remains vulnerable to various attacks, particularly in dense and mobile environments where it shows certain limitations and susceptibilities. This paper presents a comprehensive simulation-based analysis of the RPL protocol's vulnerability to the Hello Flood attack in mobile environments. Using four different group mobility models-the Column Mobility Model (CMM), Reference Point Group Mobility Model (RPGM), Nomadic Community Mobility Model (NCM), and Pursue Mobility Model (PMM)-within the Cooja simulator, this study uniquely investigates the Hello Flood attack in mobile settings, an area previously overlooked. Our systematic evaluation focuses on critical performance metrics, including the Packet Delivery Ratio (PDR), End-to-End Delay (E2ED), throughput, Expected Transmission Count (ETX), and Average Power Consumption (APC). The findings reveal several key insights: PDR decreases significantly, indicating increased packet loss or delivery failures; ETX values rise, necessitating more packet retransmissions and routing hops; E2ED increases, introducing delays in routing decisions and data transmission times; throughput declines as the attack disrupts data flow; and APC escalates due to higher energy usage on packet transmissions, especially over extended paths. These results underscore the urgent need for robust security measures to protect RPL-based IoT networks in mobile environments. Furthermore, our work emphasizes the exacerbated impact of the attack in mobile scenarios, highlighting the evolving security requirements of IoT networks.
引用
收藏
页数:32
相关论文
共 20 条
[1]  
Alves A.E.S., 2023, Braz. J. Dev, V9, P9188, DOI [10.34117/bjdv9n3-023, DOI 10.34117/BJDV9N3-023]
[2]  
Banga S., 2019, P INT C COMM COMP TE, P335
[3]  
Belkhira H.S.A., 2024, Open Inf. Sci, V8, P20220165, DOI [10.1515/opis-2022-0165, DOI 10.1515/OPIS-2022-0165]
[4]   BonnMotion 4-Taking Mobility Generation to the Next Level [J].
Bothe, Alexander ;
Aschenbruck, Nils .
2020 IEEE 39TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2020,
[5]   Implementation of survivability aware protocols in WSN for IoT applications using Contiki-OS and hardware testbed evaluation [J].
Elappila, Manu ;
Chinara, Suchismita .
MICROPROCESSORS AND MICROSYSTEMS, 2024, 104
[6]  
Farea A., 2024, Int. J. Comput. Netw. Inf. Secur., V16, DOI 10.5815/ijcnis.2024.01.01
[7]   RPL-Based IoT Networks under Decreased Rank Attack: Performance Analysis in Static and Mobile Environments [J].
Hkiri, Amal ;
Karmani, Mouna ;
Ben Bahri, Omar ;
Murayr, Ahmed Mohammed ;
Alasmari, Fawaz Hassan ;
Machhout, Mohsen .
CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01) :227-247
[8]   The Routing Protocol for low power and lossy networks (RPL) under Attack: Simulation and Analysis [J].
Hkiri, Amal ;
Karmani, Mouna ;
Machhout, Mohsen .
PROCEEDINGS OF THE 2022 5TH INTERNATIONAL CONFERENCE ON ADVANCED SYSTEMS AND EMERGENT TECHNOLOGIES IC_ASET'2022), 2022, :143-148
[9]  
Hussain S. Jagir, 2023, 2023 2nd International Conference on Edge Computing and Applications (ICECAA), P117, DOI 10.1109/ICECAA58104.2023.10212142
[10]  
Lakshmi H., 2019, Int. J. Eng. Adv. Technol., V8, P1792