Performance of DIO Suppression attack in RPL based IoT networks

Authors

  • Vikas Sindhu

DOI:

https://doi.org/10.36676/urr.2023-v10i1-032

Keywords:

IoT, RPL, DIO suppression attack, NLBGNDO

Abstract

Wireless sensor networks are very important in many uses, but they can be attacked, which can make the network less secure and less effective. The Routing Protocol for Low-Power and Lossy “Networks (RPL) is the target of the DIO silencing attack. The goal of this study is to figure out how the DIO suppression attack affects RPL and how well the NLBGNDO algorithm stops the attack. To reach this goal, an accurate model of the RPL protocol and the DIO silence attack are built into a modelling code. The modelling code includes the NLBGNDO routing algorithm, which is a suggested safe and effective routing method for RPL. Key measures, like the number of packets delivered, the length of the path, and the amount of power used, are recorded and analysed both when the network is working normally and when it is under attack. The results of the study show how vulnerable RPL is to the DIO suppression attack and how well the NLBGNDO algorithm works to protect against its effects. The packet delivery ratio shows how the attack affects the network's ability to send data, and the route stretch measure shows how well the routing method works when under attack.

References

Ge Guo A Lightweight Countermeasure toDIS Attack in RPL Routing Protocol 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC)Year: 2021

Eric Garcia Ribera;Brian Martinez Alvarez;Charisma Samuel;Philokypros P. Ioulianou;Vassilios G. Vassilakis Heartbeat-Based Detection of Blackhole and Greyhole Attacks in RPL Networks 2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP) Year: 2020 |

Ruchi Mehta;M.M. Parmar Trust based mechanism for Securing IoT Routing Protocol RPL against Wormhole &Grayhole Attacks 2018 3rd International Conference for Convergence in Technology (I2CT) Year: 2018

Abdul Rehman;Meer Muhammad Khan;M. Ali Lodhi;Faisal Bashir Hussain Rank attack using objective function in RPL for low power and lossy networks 2016 International Conference on Industrial Informatics and Computer Systems (CIICS) Year: 2019 |

Syeda Mariam Muzammal;Raja Kumar Murugesan;Noor Zaman Jhanjhi;Low Tang Jung SMTrust: Proposing Trust-Based Secure Routing Protocol for RPL Attacks for IoT Applications 2020 International Conference on Computational Intelligence (ICCI)

Anhtuan Le;Jonathan Loo;Yuan Luo;Aboubaker Lasebae Specification-based IDS for securing RPL from topology attacks 2011 IFIP Wireless Days (WD) Year: 2019 |

Wijdan Choukri;Hanane Lamaazi;Nabil Benamar RPL rank attack detection using Deep Learning 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT) Year: 2020

David Airehrour;Jairo Gutierrez;Sayan Kumar Ray A testbed implementation of a trust-aware RPL routing protocol 2017 27th International Telecommunication Networks and Applications Conference (ITNAC) Year: 2019 |

Faraz Idris Khan;Taeshik Shon;Taekkyeun Lee;Kihyung Kim Wormhole attack prevention mechanism for RPL based LLN network 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN) Year: 2020 |

Fatima-tuz-Zahra;NZ Jhanjhi;Sarfraz Nawaz Brohi;Nazir A. Malik;Mamoona Humayun Proposing a Hybrid RPL Protocol for Rank and Wormhole Attack Mitigation using Machine Learning 2020 2nd International Conference on Computer and Information Sciences (ICCIS) Year: 2020 |

Abhay Deep Seth;Santosh Biswas;Amit Kumar Dhar Detection and Verification of Decreased Rank Attack using Round-Trip Times in RPL-Based 6LoWPAN Networks 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) Year: 2020 |

Amal Hkiri;Mouna Karmani;Mohsen Machhout The Routing Protocol for low power and lossy networks (RPL) under Attack: Simulation and Analysis 2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET) Year: 2022 |

Usha Kiran IDS To Detect Worst Parent Selection Attack In RPL-Based IoT Network 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS) Year: 2022

Downloads

Published

2023-03-30
CITATION
DOI: 10.36676/urr.2023-v10i1-032
Published: 2023-03-30

How to Cite

Sindhu, V. (2023). Performance of DIO Suppression attack in RPL based IoT networks. Universal Research Reports, 10(1), 201–211. https://doi.org/10.36676/urr.2023-v10i1-032

Issue

Section

Original Research Article