New lightweight mitigation techniques for RPL version number attacks

被引:48
作者
Aris, Ahmet [1 ]
Yalcin, Siddika Berna Ors [2 ]
Oktug, Sema F. [1 ]
机构
[1] Istanbul Tech Univ, Fac Comp & Informat Engn, Istanbul, Turkey
[2] Istanbul Tech Univ, Fac Elect & Elect Engn, Istanbul, Turkey
关键词
IoT; RPL; Version number attack; DDoS; Mitigation; 6LoWPAN; INTERNET;
D O I
10.1016/j.adhoc.2018.10.022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents two lightweight mitigation techniques for RPL Version Number Attacks (VNA) which affect the performance of IPv6-connected Low Power and Lossy Networks (LLNs) detrimentally. In RPL VNA, an attacker maliciously changes the version number of the network and thus increases delay and control message overhead and reduces network lifetime and packet delivery ratio. Simple yet effective mitigation mechanisms proposed in this paper promise significant performance improvements in an RPL network under attack. By means of the proposed techniques, the delay caused by the attacker can be shortened up to 87%, the average power consumption can be reduced up to 63%, the control message overhead can be lowered up to 71% and the data packets delivery ratio can be increased up to 86%. The proposed techniques, while allowing the ordinary RPL operation, trade off the mitigation performance against the resource overheads and thus allow network administrators to choose the right scheme for their RPL network. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:81 / 91
页数:11
相关论文
共 30 条
[1]   A Distributed and Cooperative Verification Mechanism to Defend against DODAG Version Number Attack in RPL [J].
Ahmed, Firoz ;
Ko, Young-Bae .
PECCS: PROCEEDINGS OF THE 6TH INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND EMBEDDED COMPUTING AND COMMUNICATION SYSTEMS, 2016, :55-62
[2]  
[Anonymous], 2015, CONTIKI CONTIKI OPEN
[3]  
[Anonymous], 2016, A Taxonomy of Attacks in RPL-based Internet of Things
[4]  
[Anonymous], CONF GUID
[5]  
[Anonymous], 2016, P 2016 INT C EMB WIR
[6]  
[Anonymous], 2012, IEEE Std 802.15.4-2011
[7]  
[Anonymous], 2015, Proc. Intl. Conf. Pervasive Comput. (ICPC)
[8]  
Arce Ivan, 2014, TECHNICAL REPORT
[9]  
Aris A., SECURITY INTERNET TH, P337, DOI [10.1007/978-3-319-90415-3_13, DOI 10.1007/978-3-319-90415-3_13]
[10]  
Aris A, 2016, IEEE IFIP NETW OPER, P776, DOI 10.1109/NOMS.2016.7502897