Have a personal or library account? Click to login
A potential flooding version number attack against RPL based IOT networks Cover

A potential flooding version number attack against RPL based IOT networks

Open Access
|Sep 2022

Abstract

Routing protocol for low power and lossy networks (RPL) has been proposed for power, memory, and processing constrained devices. Owing to their constrained, RPL-based networks are exposed to a wide range of security attacks that mainly include control message tampering. In this paper we propose and study a modified version number attack, based on flooding the network by falsified incremented version numbers. The obtained results show that the modified attack led to an immense increase in the overhead, 1426%, compared with the attack-free case, and an increase of 182 % in the total energy consumption. When it comes to PDR a degradation to 4.7% has been recorded, affecting the reliability of the network. On the other hand, the latency also showed an increase from 0.24 s in the attack-free case to 0.89 s, which is mainly due to the high congestion created by the attack.

DOI: https://doi.org/10.2478/jee-2022-0035 | Journal eISSN: 1339-309X | Journal ISSN: 1335-3632
Language: English
Page range: 267 - 275
Submitted on: Jul 28, 2022
|
Published on: Sep 22, 2022
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2022 Mehdi Rouissat, Mohammed Belkheir, Hichem Sid Ahmed Belkhira, published by Slovak University of Technology in Bratislava
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.