A Study of RPL DODAG Version Attacks

نویسندگان

  • Anthéa Mayzaud
  • Anuj Sehgal
  • Remi Badonnel
  • Isabelle Chrisment
  • Jürgen Schönwälder
چکیده

The IETF designed the Routing Protocol for Low power and Lossy Networks (RPL) as a candidate for use in constrained networks. Keeping in mind the di↵erent requirements of such networks, the protocol was designed to support multiple routing topologies, called DODAGs, constructed using di↵erent objective functions, so as to optimize routing based on divergent metrics. A DODAG versioning system is incorporated into RPL in order to ensure that the topology does not become stale and that loops are not formed over time. However, an attacker can exploit this versioning system to gain an advantage in the topology and also acquire children that would be forced to route packets via this node. In this paper we present a study of possible attacks that exploit the DODAG version system. The impact on overhead, delivery ratio, end-to-end delay, rank inconsistencies and loops is studied.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving the QoS in Intelligent Connected EVSE by Using RPL

Nowadays, a great portion of researches research and industrial innovation is about the electric vehicles (EV) and also EV Supply Equipment (EVSE) that play an important role in this context. EVSE requires standardization via effective communication protocols. In this paper, we propose to customize the existing Internet standard Routing Protocol for Low Power and Lossy Networks (RPL) to facilit...

متن کامل

New Trust Metric for RPL Routing Protocol

Establishing trust relationships between nodes participating in constructing the routing paths represents a primary security milestone to have reliable routing processes that exclude infected or selfish nodes. In this paper, we propose a new scheme for RPL (Routing Protocol for Low-power and Lossy Networks) named: Metric-based RPL Trustworthiness Scheme (MRTS) to enhance RPL security and deal w...

متن کامل

A survey on RPL attacks and their countermeasures

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

متن کامل

Routing Attacks and Countermeasures in the RPL-Based Internet of Things

*e Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol standardized for constrained environments such as 6LoWPAN networks. Providing security in IPv6/RPL connected 6LoWPANs is challenging because the devices are connected to the untrusted Internet and are resource constrained, the communication links are lossy, and the devices use a set of novel IoT technologies ...

متن کامل

Denial-of-Service attacks on 6LoWPAN-RPL networks: Threats and an intrusion detection system proposition

RPL (Routing Protocol for Low-power and lossy networks) is a specific routing protocol designed to optimize 6LoWPAN (IPv6 over Low power Wireless Personal Area Network) operation. As 6LoWPAN suffers from resource constraints on battery, processor, memory and bandwidth, it affects the performance of the RPL protocol. From security point of view, this will make RPL vulnerable to several threats d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014