Abstract

With a predicted 50 billion devices by the end of 2020, the Internet of things has grown exponentially in the last few years. This growth has seen an increasing demand for mobility support in low power and lossy sensor networks, a type of network characterized by several limitations in terms of their resources including CPU, memory and batter, causing manufactures to push products out to the market faster, without the necessary security features. IoT networks rely on the Routing Protocol for Low Power and Lossy Network (RPL) for communication, designed by the Internet Engineering Task Force (IETF). This protocol has been proven to be efficient in relation to the handling of routing in such constrained networks, However, research studies revealed that RPL was inherently designed for static networks, indicating poor handling of mobile or dynamic topologies which is worsen when introducing mobile attacker. In this paper, two IoT routing attacks are evaluated under a mobile attacker with the aim of providing a critical evaluation of the impact the attacks have on the network in comparison to the case with static attacker. The first attack is the Rank attack in which the attacker announces false routing information to its neighbour attracting them to forward their data via the attacker. The second attack is the DIS attack in which the attacker floods the network with DIS messages triggering them to reset their transmission timers and sending messages more frequently. The comparison were conducted in terms of average power consumption and also the packet delivery ratio (PDR). Based on the results collected from the simulations, it was established that when an attacking node is mobile, there’s an average increase of 36.6 in power consumption and a decrease of 14 for packet delivery ratios when compared to a static attacking node.

Highlights

  • The Internet of Things (IoT) is a system of physical devices designed to allow data communication over a networkRevised Manuscript Received on November 25, 2020. * Correspondence AuthorChristopher Mitchel*, School of Computing at Edinburgh Napier University, 10 Colinton Road, Edinburgh, EH10 5DT, UK, Baraq Ghaleb, School of Computing at Edinburgh Napier University, 10 Colinton Road, Edinburgh, EH10 5DT, UK, Safwan M

  • Wireless sensor networks involve cheap low power sensors meaning they’re constrained by battery capacity, processing speed, computational power, and bandwidth, suggesting an attacker can exploit the limited nature of these devices, which can exhaust the network of resources leading to the suboptimization of the system [5]

  • Wireless sensor networks rely on the Routing Protocol for Low Power and Lossy Network (RPL) for communication designed by the Internet Engineering Task Force (IETF)

Read more

Summary

INTRODUCTION

The Internet of Things (IoT) is a system of physical devices designed to allow data communication over a network. The development of the Internet of Things is based on a desire to control and automate everything with minimal effort This has led to the rapid growth of and competition amongst IoT markets, where devices are being developed and deployed quickly without the appropriate security considerations, leaving many vulnerable to a multitude of attacks. Wireless sensor networks rely on the Routing Protocol for Low Power and Lossy Network (RPL) for communication designed by the Internet Engineering Task Force (IETF).

RPL OVERVIEW
Rank and Objective Function
RELATED WORK
PERFORMANCE EVALUATION AND DISCUSSION
Rank Attack
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call