Abstract

Low power and lossy networks (LLNs) are rapidly burgeoning as an important part of ubiquitous communication infrastructure, and serving as a major building block for emerging Internet-of-Things (IoT) applications. A novel routing protocol for low power and lossy networks, referred to as RPL, has been standardized to provide efficient and reliable communication in LLNs, and enable the integration of resources-constrained devices into the Internet. However, due to the lack of resources, physical protection, and security requirements of inherent routing protocol, RPL-based LLNs are admittedly vulnerable to Denial-of-Service (DoS) attacks that primarily disrupt network protocols and interfere with on-going communications. In this paper, we investigate a new type of DoS attack, called hatchetman attack, in promptly emerging RPL-based LLNs. In hatchetman attack, the malicious node manipulates the source route header of the received packets, and then generates and sends a large number of invalid packets with error route to legitimate nodes, which cause the legitimate nodes to drop the received packets and reply an excessive number of Error messages back to the DODAG root. As a result, a great number of packets are dropped by legitimate nodes and excessive Error messages exhaust the communication bandwidth and node energy, which lead to a denial of service in RPL-based LLNs. We conduct extensive simulation experiments for performance evaluation of hatchetman attack and comparison with jamming attack and original RPL without adversary. The simulation results indicate that the hatchetman attack is an extremely severe attack in RPL-based LLNs.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.