Selective Sub-DODAGs Hiding "SSDH" a new Attack in IoT RPL-Based Networks
Main Article Content
Abstract
The security concern in RPL-based IoT networks has gained a close attention by the researchers in the recent past years. This is due to the inherent constraints of nodes and the frequent change in the network topology. This makes the network vulnerable to various attacks that intend to disrupt the network availability and nodes resources. Heavy and decentralized algorithms seeking to enable the security in RPL networks as cryptographic schemes or expensive solutions are not convenient due to intrinsic characteristics of IoT nodes. In this paper, we propose and analyse a new internal hybrid routing attack against RPL, named SSDH for Selective Sub-DODAGs Hiding attack. The intruder node performing the present attack intends to isolate and exhaust the resources of a targeted subset of nodes by a selective hiding, based on its routing table. Compared to other known isolation attacks, the proposed one shows a silent malicious behavior, in which the root never knows about the isolated nodes. After the selective hiding process by dropping all packets coming from its direct or indirect children nodes, the intruder node follows its malicious behavior by provoking the victim nodes to conduct a DIO flooding based on falsified DIO messages. Simulation results obviously depict the harmful disruption of the present attack in different scenarios of RPL-based networks, by measuring the main QoS metrics: Control overhead, energy consumed, packet delivery ration and average delay. It should be noticed that the present paper describes the process of the new proposed at- tack and its effect, where the preventive and mitigation solutions will be the subject of a future work
Downloads
Metrics
Article Details
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.