Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks

被引:20
|
作者
Medjek, Faiza [1 ,2 ]
Tandjaoui, Djamel [1 ]
Romdhani, Imed [3 ]
Djedjig, Nabil [1 ,2 ]
机构
[1] CERIST, Res Ctr Sci & Tech Informat, Algiers, Algeria
[2] Univ Abderrahamane MIRA, Bejaia, Algeria
[3] Edinburgh Napier Univ, Sch Comp, 10 Colinton Rd, Edinburgh EH10 5DT, Midlothian, Scotland
关键词
RPL; Sybil attack; Routing security; IoT security;
D O I
10.1109/Trustcom/BigDataSE/ICESS.2017.351
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for Internet of Things (IoT) applications. In this paper we implemented and evaluated the performance of RPL (Routing Protocol for Low-Power and Lossy Networks) routing protocol under mobile sybil attacks, namely SybM, with respect to control overhead, packet delivery and energy consumption. In SybM attacks, Sybil nodes take the advantage of their mobility and the weakness of RPL to handle identity and mobility, to flood the network with fake control messages from different locations. To counter these type of attacks we propose a trust-based intrusion detection system based on RPL.
引用
收藏
页码:1049 / 1055
页数:7
相关论文
共 50 条
  • [1] Analytical evaluation of the impacts of Sybil attacks against RPL under mobility
    Medjek, Faiza
    Tandjaoui, Djamel
    Abdmeziem, Mohammed Riyadh
    Djedjig, Nabil
    2015 12TH IEEE INTERNATIONAL CONFERENCE ON PROGRAMMING AND SYSTEMS (ISPS), 2015, : 13 - 21
  • [2] A Lightweight Intrusion Detection for Sybil Attack Under Mobile RPL in the Internet of Things
    Murali, Sarumathi
    Jamalipour, Abbas
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (01): : 379 - 388
  • [3] Performance Evaluation of RPL Protocol Under Decreased and Increased Rank Attacks: A Focus on Smart Home Use-Case
    Bang A.
    Rao U.P.
    SN Computer Science, 4 (4)
  • [4] On the Dynamics of the RPL Protocol in AMI Networks under Jamming Attacks
    Renofio, Joao R. R.
    Pellenz, Marcelo E.
    Jamhour, Edgard
    Santin, Altair
    Penna, Manoel C.
    Souza, Richard D.
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [5] Defending Sybil Attacks in Mobile Social Networks
    Sun, Yan
    Yin, Lihua
    Liu, Wenmao
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 163 - +
  • [6] Enhancing Routing Security in IoT: Performance Evaluation of RPL's Secure Mode Under Attacks
    Raoof, Ahmed
    Matrawy, Ashraf
    Lung, Chung-Horng
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (12) : 11536 - 11546
  • [7] Delay Performance of Distributed Physical Layer Authentication Under Sybil Attacks
    Forssell, Henrik
    Thobaben, Ragnar
    Gross, James
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [8] Performance Evaluation of Routing Protocol (RPL) for Internet of Things
    Abuein, Qusai Q.
    Yassein, Muneer Bani
    Shatnawi, Mohammed Q.
    Bani-Yaseen, Laith
    Al-Omari, Omar
    Mehdawi, Moutaz
    Altawssi, Hussien
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (07) : 17 - 20
  • [9] Analysis and Performance Evaluation of RPL under Mobility
    Cobarzan, Cosmin
    Montavont, Julien
    Noel, Thomas
    2014 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2014,
  • [10] Performance Evaluation of RPL under Mobility for VANETs
    Pradhan, Rangaballav
    Rakshit, Souvik
    De, Tanmay
    2018 5TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2018, : 739 - 744