Abstract
This paper presents two lightweight mitigation techniques for RPL Version Number Attacks (VNA) which affect the performance of IPv6-connected Low Power and Lossy Networks (LLNs) detrimentally. In RPL VNA, an attacker maliciously changes the version number of the network and thus increases delay and control message overhead and reduces network lifetime and packet delivery ratio. Simple yet effective mitigation mechanisms proposed in this paper promise significant performance improvements in an RPL network under attack. By means of the proposed techniques, the delay caused by the attacker can be shortened up to 87%, the average power consumption can be reduced up to 63%, the control message overhead can be lowered up to 71% and the data packets delivery ratio can be increased up to 86%. The proposed techniques, while allowing the ordinary RPL operation, trade off the mitigation performance against the resource overheads and thus allow network administrators to choose the right scheme for their RPL network.
Original language | English |
---|---|
Pages (from-to) | 81-91 |
Number of pages | 11 |
Journal | Ad Hoc Networks |
Volume | 85 |
DOIs | |
Publication status | Published - 15 Mar 2019 |
Bibliographical note
Publisher Copyright:© 2018 Elsevier B.V.
Funding
This study was supported by 2211C - Domestic Doctoral Scholarship Program Intended for Priority Areas, No. 1649B031503218 of the Scientific and Technological Research Council of Turkey (TUBITAK) and also by The Scientific Research Office (BAP) PhD Thesis Project Supports of Istanbul Technical University under the project code 39182.
Funders | Funder number |
---|---|
Scientific Research Office | |
TUBITAK | |
British Association for Psychopharmacology | |
Türkiye Bilimsel ve Teknolojik Araştirma Kurumu | |
Istanbul Teknik Üniversitesi | 39182 |
Keywords
- 6LoWPAN
- DDoS
- IoT
- Mitigation
- RPL
- Version number attack