M. Rouissat, Mohammed Belkheir, Hichem Sid Ahmed Belkhira
{"title":"A potential flooding version number attack against RPL based IOT networks","authors":"M. Rouissat, Mohammed Belkheir, Hichem Sid Ahmed Belkhira","doi":"10.2478/jee-2022-0035","DOIUrl":null,"url":null,"abstract":"Abstract Routing protocol for low power and lossy networks (RPL) has been proposed for power, memory, and processing constrained devices. Owing to their constrained, RPL-based networks are exposed to a wide range of security attacks that mainly include control message tampering. In this paper we propose and study a modified version number attack, based on flooding the network by falsified incremented version numbers. The obtained results show that the modified attack led to an immense increase in the overhead, 1426%, compared with the attack-free case, and an increase of 182 % in the total energy consumption. When it comes to PDR a degradation to 4.7% has been recorded, affecting the reliability of the network. On the other hand, the latency also showed an increase from 0.24 s in the attack-free case to 0.89 s, which is mainly due to the high congestion created by the attack.","PeriodicalId":15661,"journal":{"name":"Journal of Electrical Engineering-elektrotechnicky Casopis","volume":"73 1","pages":"267 - 275"},"PeriodicalIF":1.0000,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Electrical Engineering-elektrotechnicky Casopis","FirstCategoryId":"5","ListUrlMain":"https://doi.org/10.2478/jee-2022-0035","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 3
Abstract
Abstract Routing protocol for low power and lossy networks (RPL) has been proposed for power, memory, and processing constrained devices. Owing to their constrained, RPL-based networks are exposed to a wide range of security attacks that mainly include control message tampering. In this paper we propose and study a modified version number attack, based on flooding the network by falsified incremented version numbers. The obtained results show that the modified attack led to an immense increase in the overhead, 1426%, compared with the attack-free case, and an increase of 182 % in the total energy consumption. When it comes to PDR a degradation to 4.7% has been recorded, affecting the reliability of the network. On the other hand, the latency also showed an increase from 0.24 s in the attack-free case to 0.89 s, which is mainly due to the high congestion created by the attack.
期刊介绍:
The joint publication of the Slovak University of Technology, Faculty of Electrical Engineering and Information Technology, and of the Slovak Academy of Sciences, Institute of Electrical Engineering, is a wide-scope journal published bimonthly and comprising.
-Automation and Control-
Computer Engineering-
Electronics and Microelectronics-
Electro-physics and Electromagnetism-
Material Science-
Measurement and Metrology-
Power Engineering and Energy Conversion-
Signal Processing and Telecommunications