On Mitigating DIS Attacks in IoT Networks

被引:2
|
作者
Aljufair, Ghada [1 ]
Mahyoub, Mohammed [2 ]
Almazyad, Abdulaziz S. [1 ]
机构
[1] KSU, Dept Comp Engn, Riyadh, Saudi Arabia
[2] Carleton Univ, Sch Informat Technol, Ottawa, ON K1S 5B6, Canada
来源
2023 18TH WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES CONFERENCE, WONS | 2023年
关键词
IoT; LLNs; RPL; Security; DIS Attacks; Contiki;
D O I
10.23919/WONS57325.2023.10061962
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Routing protocols deem a pivotal component of the communication stack in the Internet of Things (IoT). The ipv6 Routing Protocol for Low power and lossy networks (RPL) has been standardized by the Internet Engineering Task Force (IETF) for routing in IoT-based networks. RPL-related control messages are transmitted in the network to construct an optimized forwarding structure. A malicious insider node can attack RPL networks by sending a high number of unnecessary control messages which causes a detrimental side effect on the network performance. One of these attacks targets DIS control messages transmitted by a new node to join the network. This attack is called the DIS attack. The attacker can exploit the joining process to flood the network with a large volume of DIS messages. This paper aims to investigate the effect of DIS attacks on network performance and develop an effective technique to mitigate the adverse effects of such attacks. The proposed technique is implemented in the Contiki operating system and evaluated using the Cooja emulator. Compared to the standard RPL and other comparable work in the literature, the proposed technique retains low routing control cost, high throughput, and low energy consumption.
引用
收藏
页码:104 / 109
页数:6
相关论文
共 50 条
  • [31] Mitigating DDoS Flooding Attacks against IoT using Custom Hardware Modules
    Brasilino, Lucas R. B.
    Swany, Martin
    2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 58 - 64
  • [32] JAM: Mitigating Jellyfish Attacks in Wireless Ad Hoc Networks
    Samad, Fahad
    Abu Ahmed, Qassem
    Shaikh, Asadullah
    Aziz, Abdul
    EMERGING TRENDS AND APPLICATIONS IN INFORMATION COMMUNICATION TECHNOLOGIES, 2012, 281 : 432 - +
  • [33] MCC: Mitigating Colluding Collision Attacks in Wireless Sensor Networks
    Khalil, Issa
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [34] Mitigating Security Attacks in Spectrum Allocation in Cognitive Radio Networks
    Singh W.N.
    Marchang N.
    SN Computer Science, 5 (5)
  • [35] Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks
    Wang, Bolun
    Yao, Yuanshun
    Shan, Shawn
    Li, Huiying
    Viswanath, Bimal
    Zheng, Haitao
    Zhao, Ben Y.
    2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 707 - 723
  • [36] Mitigating denial of service attacks in hierarchical wireless sensor networks
    Nanda R.
    Krishna P.V.
    Network Security, 2011, 2011 (10) : 14 - 18
  • [37] Adaptive artificial immune networks for mitigating DoS flooding attacks
    Maestre Vidal, Jorge
    Sandoval Orozco, Ana Lucila
    Garcia Villalba, Luis Javier
    SWARM AND EVOLUTIONARY COMPUTATION, 2018, 38 : 94 - 108
  • [38] ISDSDN: Mitigating SYN Flood Attacks in Software Defined Networks
    Basheer Al-Duwairi
    Eslam Al-Quraan
    Yazeed AbdelQader
    Journal of Network and Systems Management, 2020, 28 : 1366 - 1390
  • [39] Mitigating Traffic Remapping Attacks in Autonomous Multihop Wireless Networks
    Konorski, Jerzy
    Szott, Szymon
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (15) : 13555 - 13569
  • [40] ISDSDN: Mitigating SYN Flood Attacks in Software Defined Networks
    Al-Duwairi, Basheer
    Al-Quraan, Eslam
    AbdelQader, Yazeed
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2020, 28 (04) : 1366 - 1390