Faiza Medjek
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks
Medjek, Faiza; Tandjaoui, Djamel; Romdhani, Imed; Djedjig, Nabil
Abstract
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of Things (IoT) applications. In this paper we implemented and evaluated the performance of RPL (Routing Protocol for Low-Power and Lossy Networks) routing protocol under mobile sybil attacks, namely SybM, with respect to control overhead, packet delivery and energy consumption. In SybM attacks, Sybil nodes take the advantage of their mobility and the weakness of RPL to handle identity and mobility, to flood the network with fake control messages from different locations. To counter these type of attacks we proposed a trust-based intrusion detection system by extending the RPL protocol
Citation
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017). Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESS. https://doi.org/10.1109/trustcom/bigdatase/icess.2017.351
Conference Name | 2017 IEEE Trustcom/BigDataSE/ICESS |
---|---|
Start Date | Aug 1, 2017 |
End Date | Aug 4, 2017 |
Acceptance Date | May 16, 2017 |
Online Publication Date | Sep 11, 2017 |
Publication Date | 2017-08 |
Deposit Date | May 16, 2017 |
Publicly Available Date | May 16, 2017 |
Publisher | Institute of Electrical and Electronics Engineers |
Series ISSN | 2324-9013 |
Book Title | 2017 IEEE Trustcom/BigDataSE/ICESS |
ISBN | 9781509049066 |
DOI | https://doi.org/10.1109/trustcom/bigdatase/icess.2017.351 |
Keywords | Internet of Things, RPL, IoT, Security, Sybil Attacks |
Public URL | http://researchrepository.napier.ac.uk/Output/846451 |
Files
Performance evaluation of RPL protocol under mobile sybil attacks
(1.3 Mb)
PDF
Copyright Statement
© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
You might also like
A Trust-based Intrusion Detection System for Mobile RPL Based Networks
(2018)
Conference Proceeding
Trust-Based Defence Model Against MAC Unfairness Attacks for IoT
(2017)
Conference Proceeding
New trust metric for the RPL routing protocol
(2017)
Conference Proceeding
Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution
(2023)
Conference Proceeding
Resolving the Decreased Rank Attack in RPL’s IoT Networks
(2023)
Conference Proceeding
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search