The Routing Protocol for low power and lossy networks (RPL) under Attack: Simulation and Analysis

被引:13
作者
Hkiri, Amal [1 ]
Karmani, Mouna [1 ]
Machhout, Mohsen [1 ]
机构
[1] Fac Sci Monastir, Elect & Micro Elect Lab, Dept Phys, Monastir, Tunisia
来源
PROCEEDINGS OF THE 2022 5TH INTERNATIONAL CONFERENCE ON ADVANCED SYSTEMS AND EMERGENT TECHNOLOGIES IC_ASET'2022) | 2022年
关键词
RPL; Hello Flooding attack; Increase Version Number attack; Decrease Rank attack; INTERNET;
D O I
10.1109/IC_ASET53395.2022.9765901
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Routing protocol for low power and lossy networks (RPL) is the underlying routing protocol of 6LoWPAN, a core communication standard for the Internet of Things. In terms of quality of service (QoS), device management, and energy efficiency, RPL beats competing wireless sensor and ad hoc routing protocols. However, several attacks could threaten the network due to the problem of unauthenticated or unencrypted control frames, centralized root controllers, compromised or unauthenticated devices. Thus, in this paper, we aim to investigate the effect of topology and Resources attacks on RPL.s efficiency. The Hello Flooding attack, Increase Number attack and Decrease Rank attack are the three forms of Resources attacks and Topology attacks respectively chosen to work on. The simulations were done to understand the impact of the three different attacks on RPL performances metrics including End-to-End Delay (E2ED), throughput, Packet Delivery Ratio (PDR) and average power consumption. The findings show that the three attacks increased the E2ED, decreased the PDR and the network throughput, and degrades the network', which further raises the power consumption of the network nodes.
引用
收藏
页码:143 / 148
页数:6
相关论文
共 29 条
[1]  
Agiollo A., 2021, IEEE T NETW SERV MAN, V18, P1178, DOI DOI 10.1109/TNSM.2021.3075496
[2]   Congestion control in wireless sensor and 6LoWPAN networks: toward the Internet of Things [J].
Al-Kashoash, Hayder A. A. ;
Kharrufa, Harith ;
Al-Nidawi, Yaarob ;
Kemp, Andrew H. .
WIRELESS NETWORKS, 2019, 25 (08) :4493-4522
[3]   Proposing a Secure RPL based Internet of Things Routing Protocol: A Review [J].
Almusaylim, Zahrah A. ;
Alhumam, Abdulaziz ;
Jhanjhi, N. Z. .
AD HOC NETWORKS, 2020, 101
[4]  
[Anonymous], 2013, Tmote Sky - Ultra low power IEEE 802.15.4 compliant wireless sensor module
[5]   New lightweight mitigation techniques for RPL version number attacks [J].
Aris, Ahmet ;
Yalcin, Siddika Berna Ors ;
Oktug, Sema F. .
AD HOC NETWORKS, 2019, 85 :81-91
[6]  
Aris Ahmet, 2020, CONTIKI OPEN SOURCE
[7]  
Bokka Raveendranadh, 2021, 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC), P1017, DOI 10.1109/ICESC51422.2021.9532901
[8]  
Boudouaia Mohammed Amine, SECURITY RANK ATTACK
[9]  
Devi B. Rajesh, 2017, INT J ENG TECHNOLOGY, V7, P93
[10]  
Emec Murat, 2020, 3 TYPES ATTACK SIMUL