Abstract

The Internet of Things (IoT) environment comprises large scale deployment of constrained devices like RFIDs and sensors making routing an essential requirement. These constrained devices are part of the Low power and Lossy Networks (LLNs) in the IoT. The Internet Engineering Task Force standardized IPv6 Routing Protocol for Low power and Lossy Networks (RPL) as the routing protocol for LLNs in IoT. IoT-LLNs are organized as multiple Destination Oriented Directed Acyclic Graphs (DODAGs). The root node in the DODAG organizes and maintains the DODAG through broadcast based configuration information dissemination process. The root node also connects the various nodes in the DODAG to the rest of the IoT network. Hence, for any node in the IoT-LLN, connectivity with the root node is important. We present a novel Network Partitioning Attack (NPA) scenario against RPL in IoT-LLNs wherein a malicious node segregates a section of the IoT-LLN from the root node and thus from the rest of the IoT network. In this paper, we discuss in-depth the vulnerabilities of RPL, which result in the proposed Network Partitioning Attack. We present an analytical model to demonstrate the impact of the attack on the performance of the routing protocol and validate the model through simulation. We also suggest mechanisms to mitigate the attack.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.