Analysis of the RPL Version Number Attack with Multiple Attackers

Ahmet Aris, S. Oktug
{"title":"Analysis of the RPL Version Number Attack with Multiple Attackers","authors":"Ahmet Aris, S. Oktug","doi":"10.1109/CyberSA49311.2020.9139695","DOIUrl":null,"url":null,"abstract":"In this study, we aim to understand the effect of multiple Version Number Attackers (VNA) in RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) -based Internet of Things (IoT) networks. VNA is one of the most detrimental Denial of Service (DoS) attack that targets the availability of IoT networks. Almost all of the studies targeting the VNA considered a single attacker. However, once an attacker has chance to compromise a node in the network, it may easily compromise more devices, thus 1) affect the performance of the network more and misuse the resources quicker, 2) circumvent the existing security mechanisms and 3) perform other attacks which require more than one malicious node (e.g., wormhole, etc.). Therefore, we have to take multiple attackers into account when designing security systems. In this work, we analyze the effect of multiple attackers from various points of view. Based on extensive simulations and analysis, we conclude that increasing the number of attackers affects only the packet delivery ratio and does not affect average network delay and average power consumption. Our results also show that attacking positions closer to the root cause longer delays and higher power consumption results while central attacking positions are more effective on the packet delivery ratio. Lastly, we evaluate the performance of a recently proposed mitigation technique against multiple attackers.","PeriodicalId":354157,"journal":{"name":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberSA49311.2020.9139695","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

In this study, we aim to understand the effect of multiple Version Number Attackers (VNA) in RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) -based Internet of Things (IoT) networks. VNA is one of the most detrimental Denial of Service (DoS) attack that targets the availability of IoT networks. Almost all of the studies targeting the VNA considered a single attacker. However, once an attacker has chance to compromise a node in the network, it may easily compromise more devices, thus 1) affect the performance of the network more and misuse the resources quicker, 2) circumvent the existing security mechanisms and 3) perform other attacks which require more than one malicious node (e.g., wormhole, etc.). Therefore, we have to take multiple attackers into account when designing security systems. In this work, we analyze the effect of multiple attackers from various points of view. Based on extensive simulations and analysis, we conclude that increasing the number of attackers affects only the packet delivery ratio and does not affect average network delay and average power consumption. Our results also show that attacking positions closer to the root cause longer delays and higher power consumption results while central attacking positions are more effective on the packet delivery ratio. Lastly, we evaluate the performance of a recently proposed mitigation technique against multiple attackers.
多攻击者的RPL版本号攻击分析
在本研究中,我们旨在了解多个版本号攻击者(VNA)在基于RPL(低功耗和有损网络的IPv6路由协议)的物联网(IoT)网络中的影响。VNA是针对物联网网络可用性的最有害的拒绝服务(DoS)攻击之一。几乎所有针对越南人民军的研究都只考虑了一个攻击者。然而,一旦攻击者有机会入侵网络中的一个节点,它就很容易入侵更多的设备,从而1)更多地影响网络的性能,更快地滥用资源,2)绕过现有的安全机制,3)执行其他需要多个恶意节点的攻击(例如,虫洞等)。因此,在设计安全系统时必须考虑多个攻击者。在这项工作中,我们从不同的角度分析了多个攻击者的影响。通过大量的仿真和分析,我们得出结论,攻击者数量的增加只会影响数据包的发送率,而不会影响平均网络延迟和平均功耗。我们的研究结果还表明,靠近根源的攻击位置会导致更长的延迟和更高的功耗结果,而中心攻击位置对分组分发率更有效。最后,我们评估了最近提出的针对多个攻击者的缓解技术的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信