Article, 2024

Investigating Routing Protocol Attacks on Low Power and Lossy IoT Networks

SN Computer Science, ISSN 2662-995X, 2661-8907, Volume 5, 4, Page 393, 10.1007/s42979-024-02747-y

Contributors

Kiran, Usha (Corresponding author) [1] Maurya, Poonam [2] Sharma, Himanshu [3]

Affiliations

  1. [1] Indian Institute of Technology Bhilai
  2. [NORA names: India; Asia, South];
  3. [2] Aalborg University
  4. [NORA names: AAU Aalborg University; University; Denmark; Europe, EU; Nordic; OECD];
  5. [3] Dr. A.P.J. Abdul Kalam Technical University
  6. [NORA names: India; Asia, South]

Abstract

Internet-of-things (IoT) networks are distinguished by nodes with limited computational power and storage capacity, making Low Power and Lossy Networks (LLNs) protocols essential for effective communication in resource-constrained environments. One such protocol is the Routing Protocol for Low-Power and Lossy networks (RPL), which establishes and manages routes in RPL-based networks. RPL contributes to optimized routing and reduced network overhead in LLNs. However, the RPL-based protocol is susceptible to various internal and external vulnerabilities that require thorough exploration and mitigation. Experimental results illustrate the impact of several RPL attacks, including the DODAG Information Solicitation (DIS) attack, version number attack, decreased rank attack, and worst parent selection (WPS) attack. For simulation purposes, we employed the Contiki Cooja network simulator. Further, we conduct a comparative analysis of these RPL-based attacks, revealing that the WPS attack has a significant impact on the network performance compared to other attacks mentioned in the paper.

Keywords

Contiki, Cooja network simulator, DODAG, DODAG Information Solicitation, Internet-of-Things, IoT, IoT networks, LLN, RPL, RPL attacks, RPL-based networks, WPS, analysis, attacks, capacity, communication, comparative analysis, computational power, decreased rank attack, effective communication, environment, experimental results, exploration, external vulnerability, impact, information solicitation, lossy, lossy networks, low power, low-power, mitigation, network, network performance, network simulator, nodes, performance, power, protocol, protocol attacks, purposes, rank attack, reduced network, resource-constrained environments, results, route, routing protocol, routing protocol attacks, simulation, simulation purposes, solicitation, storage, storage capacity, version, version number attack, vulnerability

Data Provider: Digital Science