Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks

被引:20
|
作者
Medjek, Faiza [1 ,2 ]
Tandjaoui, Djamel [1 ]
Romdhani, Imed [3 ]
Djedjig, Nabil [1 ,2 ]
机构
[1] CERIST, Res Ctr Sci & Tech Informat, Algiers, Algeria
[2] Univ Abderrahamane MIRA, Bejaia, Algeria
[3] Edinburgh Napier Univ, Sch Comp, 10 Colinton Rd, Edinburgh EH10 5DT, Midlothian, Scotland
关键词
RPL; Sybil attack; Routing security; IoT security;
D O I
10.1109/Trustcom/BigDataSE/ICESS.2017.351
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for Internet of Things (IoT) applications. In this paper we implemented and evaluated the performance of RPL (Routing Protocol for Low-Power and Lossy Networks) routing protocol under mobile sybil attacks, namely SybM, with respect to control overhead, packet delivery and energy consumption. In SybM attacks, Sybil nodes take the advantage of their mobility and the weakness of RPL to handle identity and mobility, to flood the network with fake control messages from different locations. To counter these type of attacks we propose a trust-based intrusion detection system based on RPL.
引用
收藏
页码:1049 / 1055
页数:7
相关论文
共 50 条
  • [21] Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services
    Wang, Gang
    Wang, Bolun
    Wang, Tianyi
    Nika, Ana
    Zheng, Haitao
    Zhao, Ben Y.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (03) : 1123 - 1136
  • [22] Physical Identification Based Trust Path Routing Against Sybil Attacks on RPL in IoT Networks
    Kim, Jae-Dong
    Ko, Minseok
    Chung, Jong-Moon
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (05) : 1102 - 1106
  • [23] Predictable Model for Detecting Sybil Attacks in Mobile Social Networks
    Lyu, Chen
    Huang, Dongmei
    Jia, Qingyao
    Han, Xiao
    Zhang, Xiaomei
    Chi, Chi-Hung
    Xu, Yang
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [24] Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
    Quercia, Daniele
    Hailes, Stephen
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [25] Experimental Evaluation of a Routing Protocol for WSNs: RPL robustness under study
    Heurtefeux, Karel
    Menouar, Hamid
    AbuAli, Najah
    2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2013, : 491 - 498
  • [26] Performance evaluation of mobile ad hoc networks under flooding-based attacks
    Abdelhaq, Maha
    Hassan, Rosilah
    Ismail, Mahamod
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 4328 - 4345
  • [27] Auto Defence Mechanism for SYBIL Attacks in Manets using QABR Protocol
    Anitha, V
    Akilandeswari, J.
    Sowmya, P.
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, COMPUTERS AND COMMUNICATIONS (ICAECC), 2014,
  • [28] A Security Routing Mechanism against Sybil Attacks in Mobile Social Networks
    Sun, Yan
    Yin, Lihua
    WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, PT II, 2014, 8710 : 325 - 332
  • [29] Experimental Evaluation of a Routing Protocol for Wireless Sensor Networks: RPL under study
    Heurtefeux, Karel
    Menouar, Hamid
    2013 6TH JOINT IFIP WIRELESS AND MOBILE NETWORKING CONFERENCE (WMNC 2013), 2013,
  • [30] Analysis and Enhancement of RPL under Packet Drop Attacks
    Chen, Binbin
    Li, Yuan
    Mashima, Daisuke
    2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2018, : 167 - 174