{"title":"On Mitigating DIS Attacks in IoT Networks","authors":"Ghada Aljufair, M. Mahyoub, A. Almazyad","doi":"10.23919/WONS57325.2023.10061962","DOIUrl":null,"url":null,"abstract":"Routing protocols deem a pivotal component of the communication stack in the Internet of Things (IoT). The ipv6 Routing Protocol for Low power and lossy networks (RPL) has been standardized by the Internet Engineering Task Force (IETF) for routing in IoT-based networks. RPL-related control messages are transmitted in the network to construct an optimized forwarding structure. A malicious insider node can attack RPL networks by sending a high number of unnecessary control messages which causes a detrimental side effect on the network performance. One of these attacks targets DIS control messages transmitted by a new node to join the network. This attack is called the DIS attack. The attacker can exploit the joining process to flood the network with a large volume of DIS messages. This paper aims to investigate the effect of DIS attacks on network performance and develop an effective technique to mitigate the adverse effects of such attacks. The proposed technique is implemented in the Contiki operating system and evaluated using the Cooja emulator. Compared to the standard RPL and other comparable work in the literature, the proposed technique retains low routing control cost, high throughput, and low energy consumption.","PeriodicalId":380263,"journal":{"name":"2023 18th Wireless On-Demand Network Systems and Services Conference (WONS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 18th Wireless On-Demand Network Systems and Services Conference (WONS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/WONS57325.2023.10061962","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Routing protocols deem a pivotal component of the communication stack in the Internet of Things (IoT). The ipv6 Routing Protocol for Low power and lossy networks (RPL) has been standardized by the Internet Engineering Task Force (IETF) for routing in IoT-based networks. RPL-related control messages are transmitted in the network to construct an optimized forwarding structure. A malicious insider node can attack RPL networks by sending a high number of unnecessary control messages which causes a detrimental side effect on the network performance. One of these attacks targets DIS control messages transmitted by a new node to join the network. This attack is called the DIS attack. The attacker can exploit the joining process to flood the network with a large volume of DIS messages. This paper aims to investigate the effect of DIS attacks on network performance and develop an effective technique to mitigate the adverse effects of such attacks. The proposed technique is implemented in the Contiki operating system and evaluated using the Cooja emulator. Compared to the standard RPL and other comparable work in the literature, the proposed technique retains low routing control cost, high throughput, and low energy consumption.
路由协议是物联网通信栈的关键组成部分。ipv6 RPL (Routing Protocol for Low power and lossy networks)已被IETF (Internet Engineering Task Force)标准化,用于物联网网络中的路由。与rpl相关的控制消息在网络中传递,形成优化的转发结构。恶意的内部节点可以通过发送大量不必要的控制消息来攻击RPL网络,从而对网络性能产生不利影响。其中一种攻击的目标是通过新节点加入网络传输的DIS控制消息。这种攻击被称为DIS攻击。攻击者可以利用加入过程向网络中散布大量的DIS消息。本文旨在研究DIS攻击对网络性能的影响,并开发一种有效的技术来减轻此类攻击的不利影响。提出的技术在Contiki操作系统中实现,并使用Cooja仿真器进行了评估。与标准RPL和文献中其他类似的工作相比,所提出的技术保持了低路由控制成本、高吞吐量和低能耗。