The impacts of internal threats towards Routing Protocol for Low power and lossy network performance
- 1 July 2013
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 000789-000794
- https://doi.org/10.1109/iscc.2013.6755045
Abstract
Routing Protocol for Low Power and Lossy network (RPL) is the underlying routing protocol of 6LoWPAN standard to enable the integration of Wireless Sensor Network on the Internet. Security is an essential requirement for the protocol/standard to be public accepted. One major security issue of RPL is the non-tamper resistant nature of the wireless sensor device, which can make it easy to be compromised and leads to cryptography keys exposed. If this happens, the attackers can join the network as the internal legitimate users and can manipulate the network operation based on controlling the compromised nodes. These internal attackers can make severe consequences to the network performance. In this paper, we present a simulation-based study of the impacts of different types of such attacks on RPL. We consider several new internal threats towards RPL, namely Rank attack, Local Repair attack, Neighbour attack and DIS attack. Specifically we study how the network performance can be affected by those attacks through metrics such as end-to-end delay, delivery ratio and control overhead generated. To the best of our knowledge, this is the first paper that studies the vulnerability and the performance of RPL under these internal security threats.Keywords
This publication has 6 references indexed in Scilit:
- 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approachInternational Journal of Communication Systems, 2012
- RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks2012
- Specification-based IDS for securing RPL from topology attacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- RPL Based Routing for Advanced Metering Infrastructure in Smart GridPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Routing Loops in DAG-Based Low Power and Lossy NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- A study of different types of attacks on multicast in mobile ad hoc networksAd Hoc Networks, 2008