RPL version number attacks: In-depth study

Ahmet Aris, Sema F. Oktug, S. Berna Ors Yalcin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

65 Citations (Scopus)

Abstract

In this work, we study the RPL version number attacks in-depth and analyze the attack from various points of view. The unique aspects of our work can be seen in our analysis of a realistic network topology that has both static and mobile nodes with different cardinalities for which our inspiration came from the IETF routing requirement documents. We also analyze how version number attack affects the power consumption of the nodes. We incorporated a probabilistic attacking model where the attacker attacks with a probability of p (e.g., 0, 0.3, 0.5, 0.7, 1). We also provide the performance results with respect to various values of p.

Original languageEnglish
Title of host publicationProceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium
EditorsSema Oktug Badonnel, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages776-779
Number of pages4
ISBN (Electronic)9781509002238
DOIs
Publication statusPublished - 30 Jun 2016
Event2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016 - Istanbul, Turkey
Duration: 25 Apr 201629 Apr 2016

Publication series

NameProceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium

Conference

Conference2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016
Country/TerritoryTurkey
CityIstanbul
Period25/04/1629/04/16

Bibliographical note

Publisher Copyright:
© 2016 IEEE.

Keywords

  • DoS
  • IoT
  • LLN
  • RPL
  • Version Number Attack

Fingerprint

Dive into the research topics of 'RPL version number attacks: In-depth study'. Together they form a unique fingerprint.

Cite this