Performance evaluation of RPL protocol under mobile sybil attacks

F Medjek, D Tandjaoui, I Romdhani… - 2017 IEEE Trustcom …, 2017 - ieeexplore.ieee.org
2017 IEEE Trustcom/BigDataSE/ICESS, 2017ieeexplore.ieee.org
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to
maliciously manipulate the network. These attacks are very harmful for Internet of Things
(IoT) applications. In this paper we implemented and evaluated the performance of RPL
(Routing Protocol for Low-Power and Lossy Networks) routing protocol under mobile sybil
attacks, namely SybM, with respect to control overhead, packet delivery and energy
consumption. In SybM attacks, Sybil nodes take the advantage of their mobility and the …
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for Internet of Things (IoT) applications. In this paper we implemented and evaluated the performance of RPL (Routing Protocol for Low-Power and Lossy Networks) routing protocol under mobile sybil attacks, namely SybM, with respect to control overhead, packet delivery and energy consumption. In SybM attacks, Sybil nodes take the advantage of their mobility and the weakness of RPL to handle identity and mobility, to flood the network with fake control messages from different locations. To counter these type of attacks we propose a trust-based intrusion detection system based on RPL.
ieeexplore.ieee.org
Showing the best result for this search. See all results