Faiza Medjek
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks
Medjek, Faiza; Tandjaoui, Djamel; Romdhani, Imed; Djedjig, Nabil
Abstract
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of Things (IoT) applications. In this paper we implemented and evaluated the performance of RPL (Routing Protocol for Low-Power and Lossy Networks) routing protocol under mobile sybil attacks, namely SybM, with respect to control overhead, packet delivery and energy consumption. In SybM attacks, Sybil nodes take the advantage of their mobility and the weakness of RPL to handle identity and mobility, to flood the network with fake control messages from different locations. To counter these type of attacks we proposed a trust-based intrusion detection system by extending the RPL protocol
Citation
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017, August). Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. Presented at 2017 IEEE Trustcom/BigDataSE/ICESS
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 2017 IEEE Trustcom/BigDataSE/ICESS |
Start Date | Aug 1, 2017 |
End Date | Aug 4, 2017 |
Acceptance Date | May 16, 2017 |
Online Publication Date | Sep 11, 2017 |
Publication Date | 2017-08 |
Deposit Date | May 16, 2017 |
Publicly Available Date | May 16, 2017 |
Publisher | Institute of Electrical and Electronics Engineers |
Series ISSN | 2324-9013 |
Book Title | 2017 IEEE Trustcom/BigDataSE/ICESS |
ISBN | 9781509049066 |
DOI | https://doi.org/10.1109/trustcom/bigdatase/icess.2017.351 |
Keywords | Internet of Things, RPL, IoT, Security, Sybil Attacks |
Public URL | http://researchrepository.napier.ac.uk/Output/846451 |
Contract Date | May 16, 2017 |
Files
Performance evaluation of RPL protocol under mobile sybil attacks
(1.3 Mb)
PDF
Copyright Statement
© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
You might also like
Password Pattern and Vulnerability Analysis for Web and Mobile Applications
(2016)
Journal Article
A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval.
(2015)
Presentation / Conference Contribution
Mobile User Authentication System for E-commerce Applications.
(2014)
Presentation / Conference Contribution