Performance Evaluation of RPL Protocol under Mobile Sybil Attacks
Title | Performance Evaluation of RPL Protocol under Mobile Sybil Attacks |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Medjek, F., Tandjaoui, D., Romdhani, I., Djedjig, N. |
Conference Name | 2017 IEEE Trustcom/BigDataSE/ICESS |
Date Published | aug |
Publisher | IEEE |
ISBN Number | 978-1-5090-4906-6 |
Keywords | composability, computer network performance evaluation, computer network security, control overhead, energy consumption, fake control messages, Internet of Things, Internet of Things applications, IoT, IoT security, mobile computing, mobile nodes, mobile sybil attacks, Network topology, packet delivery, performance evaluation, physical adversary, power aware computing, pubcrawl, resilience, Resiliency, Routing, routing protocol for low-power and lossy networks, Routing protocols, routing security, RPL, RPL protocol, Scalability, stolen identities, Sybil attack, SybM, Topology, Trust Routing, trust-based intrusion detection system |
Abstract | In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for Internet of Things (IoT) applications. In this paper we implemented and evaluated the performance of RPL (Routing Protocol for Low-Power and Lossy Networks) routing protocol under mobile sybil attacks, namely SybM, with respect to control overhead, packet delivery and energy consumption. In SybM attacks, Sybil nodes take the advantage of their mobility and the weakness of RPL to handle identity and mobility, to flood the network with fake control messages from different locations. To counter these type of attacks we propose a trust-based intrusion detection system based on RPL. |
URL | https://ieeexplore.ieee.org/document/8029554/ |
DOI | 10.1109/Trustcom/BigDataSE/ICESS.2017.351 |
Citation Key | medjek_performance_2017 |
- RPL protocol
- pubcrawl
- resilience
- Resiliency
- Routing
- routing protocol for low-power and lossy networks
- Routing protocols
- routing security
- RPL
- power aware computing
- Scalability
- stolen identities
- Sybil attack
- SybM
- Topology
- Trust Routing
- trust-based intrusion detection system
- IoT security
- computer network performance evaluation
- computer network security
- control overhead
- energy consumption
- fake control messages
- Internet of Things
- Internet of Things applications
- IoT
- composability
- mobile computing
- mobile nodes
- mobile sybil attacks
- network topology
- packet delivery
- performance evaluation
- physical adversary