On Mitigating DIS Attacks in IoT Networks

被引:2
|
作者
Aljufair, Ghada [1 ]
Mahyoub, Mohammed [2 ]
Almazyad, Abdulaziz S. [1 ]
机构
[1] KSU, Dept Comp Engn, Riyadh, Saudi Arabia
[2] Carleton Univ, Sch Informat Technol, Ottawa, ON K1S 5B6, Canada
关键词
IoT; LLNs; RPL; Security; DIS Attacks; Contiki;
D O I
10.23919/WONS57325.2023.10061962
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Routing protocols deem a pivotal component of the communication stack in the Internet of Things (IoT). The ipv6 Routing Protocol for Low power and lossy networks (RPL) has been standardized by the Internet Engineering Task Force (IETF) for routing in IoT-based networks. RPL-related control messages are transmitted in the network to construct an optimized forwarding structure. A malicious insider node can attack RPL networks by sending a high number of unnecessary control messages which causes a detrimental side effect on the network performance. One of these attacks targets DIS control messages transmitted by a new node to join the network. This attack is called the DIS attack. The attacker can exploit the joining process to flood the network with a large volume of DIS messages. This paper aims to investigate the effect of DIS attacks on network performance and develop an effective technique to mitigate the adverse effects of such attacks. The proposed technique is implemented in the Contiki operating system and evaluated using the Cooja emulator. Compared to the standard RPL and other comparable work in the literature, the proposed technique retains low routing control cost, high throughput, and low energy consumption.
引用
收藏
页码:104 / 109
页数:6
相关论文
共 50 条
  • [21] Protocols for mitigating blackhole attacks in delay tolerant networks
    Preeti Nagrath
    Sandhya Aneja
    Neelima Gupta
    Sanjay Madria
    Wireless Networks, 2016, 22 : 235 - 246
  • [22] Mitigating Denial of Service (DoS) Attacks in OpenFlow Networks
    Oktian, Yustus Eko
    Lee, SangGon
    Lee, HoonJae
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 325 - 330
  • [23] Mitigating Eclipse Attacks in Peer-to-Peer Networks
    Germanus, Daniel
    Roos, Stefanie
    Strufe, Thorsten
    Suri, Neeraj
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 400 - 408
  • [24] A holistic approach to mitigating DoS attacks in SDN networks
    Dridi, Lobna
    Zhani, Mohamed Faten
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2018, 28 (01)
  • [25] Mitigating the impact of adversarial attacks in very deep networks
    Hassanin, Mohammed
    Radwan, Ibrahim
    Moustafa, Nour
    Tahtali, Murat
    Kumar, Neeraj
    APPLIED SOFT COMPUTING, 2021, 105 (105)
  • [26] SAD-IoT: Security Analysis of DDoS Attacks in IoT Networks
    Prahlad Kumar
    Harnoor Bagga
    Bhuneshwar Singh Netam
    Venkanna Uduthalapally
    Wireless Personal Communications, 2022, 122 : 87 - 108
  • [27] SAD-IoT: Security Analysis of DDoS Attacks in IoT Networks
    Kumar, Prahlad
    Bagga, Harnoor
    Netam, Bhuneshwar Singh
    Uduthalapally, Venkanna
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (01) : 87 - 108
  • [28] Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
    Baird, Iain
    Ghaleb, Baraq
    Wadhaj, Isam
    Russell, Gordon
    Buchanan, William J.
    ELECTRONICS, 2024, 13 (17)
  • [29] Trust-based Intelligent Scheme for Mitigating Black Hole Attacks in IoT
    Feroz Khan AB
    Weslin D
    Dilli Babu M
    Mohammed Muzaffar Hussain
    Journal of Harbin Institute of Technology(New Series), 2024, (03) : 39 - 50
  • [30] Mitigating DDoS Flooding Attacks against IoT using Custom Hardware Modules
    Brasilino, Lucas R. B.
    Swany, Martin
    2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 58 - 64