New lightweight mitigation techniques for RPL version number attacks

Ahmet Arış*, Sıddıka Berna Örs Yalçın, Sema F. Oktuğ

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

59 Citations (Scopus)

Abstract

This paper presents two lightweight mitigation techniques for RPL Version Number Attacks (VNA) which affect the performance of IPv6-connected Low Power and Lossy Networks (LLNs) detrimentally. In RPL VNA, an attacker maliciously changes the version number of the network and thus increases delay and control message overhead and reduces network lifetime and packet delivery ratio. Simple yet effective mitigation mechanisms proposed in this paper promise significant performance improvements in an RPL network under attack. By means of the proposed techniques, the delay caused by the attacker can be shortened up to 87%, the average power consumption can be reduced up to 63%, the control message overhead can be lowered up to 71% and the data packets delivery ratio can be increased up to 86%. The proposed techniques, while allowing the ordinary RPL operation, trade off the mitigation performance against the resource overheads and thus allow network administrators to choose the right scheme for their RPL network.

Original languageEnglish
Pages (from-to)81-91
Number of pages11
JournalAd Hoc Networks
Volume85
DOIs
Publication statusPublished - 15 Mar 2019

Bibliographical note

Publisher Copyright:
© 2018 Elsevier B.V.

Funding

This study was supported by 2211C - Domestic Doctoral Scholarship Program Intended for Priority Areas, No. 1649B031503218 of the Scientific and Technological Research Council of Turkey (TUBITAK) and also by The Scientific Research Office (BAP) PhD Thesis Project Supports of Istanbul Technical University under the project code 39182.

FundersFunder number
Scientific Research Office
TUBITAK
British Association for Psychopharmacology
Türkiye Bilimsel ve Teknolojik Araştirma Kurumu
Istanbul Teknik Üniversitesi39182

    Keywords

    • 6LoWPAN
    • DDoS
    • IoT
    • Mitigation
    • RPL
    • Version number attack

    Fingerprint

    Dive into the research topics of 'New lightweight mitigation techniques for RPL version number attacks'. Together they form a unique fingerprint.

    Cite this