Analysis of RPL Objective Functions with Security Perspective

C. Doğan, Selim Yılmaz, Sevil Şen
{"title":"Analysis of RPL Objective Functions with Security Perspective","authors":"C. Doğan, Selim Yılmaz, Sevil Şen","doi":"10.5220/0011011900003118","DOIUrl":null,"url":null,"abstract":"The IPv6 Routing Protocol for Low Power Lossy Networks (RPL) is one of the standardized routing protocols for lossy networks consisting of resource-constrained Internet of Things (IoT) devices. RPL allows to use different objective functions based on different routing metrics such as expected transmission count (ETX), hop count, and energy to determine effective routes. In the literature, the performance of two objective functions namely Objective Function Zero (OF0), Minimum Rank with Hysteresis Objective Function (MRHOF) are evaluated thoroughly, since they are accepted as standard objective functions in RPL. However their performance under attack has not been evaluated comprehensively yet. Although RPL has defined some specifications for its security, it is still vulnerable to insider attacks, which could dramatically affect the network performance. Therefore, this study investigates how the performance of objective functions are affected by RPL specific attacks. Version number, DIS flooding, and worst parent attacks are analyzed by using the following performance metrics: packet delivery ratio, overhead, latency, and power consumption. Moreover, how they are affected by the number of attackers in the network are analyzed. To the best of the authors’ knowledge, this is the first study that comprehensively explores RPL objective functions on networks under","PeriodicalId":72028,"journal":{"name":"... International Conference on Wearable and Implantable Body Sensor Networks. International Conference on Wearable and Implantable Body Sensor Networks","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"... International Conference on Wearable and Implantable Body Sensor Networks. International Conference on Wearable and Implantable Body Sensor Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5220/0011011900003118","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

The IPv6 Routing Protocol for Low Power Lossy Networks (RPL) is one of the standardized routing protocols for lossy networks consisting of resource-constrained Internet of Things (IoT) devices. RPL allows to use different objective functions based on different routing metrics such as expected transmission count (ETX), hop count, and energy to determine effective routes. In the literature, the performance of two objective functions namely Objective Function Zero (OF0), Minimum Rank with Hysteresis Objective Function (MRHOF) are evaluated thoroughly, since they are accepted as standard objective functions in RPL. However their performance under attack has not been evaluated comprehensively yet. Although RPL has defined some specifications for its security, it is still vulnerable to insider attacks, which could dramatically affect the network performance. Therefore, this study investigates how the performance of objective functions are affected by RPL specific attacks. Version number, DIS flooding, and worst parent attacks are analyzed by using the following performance metrics: packet delivery ratio, overhead, latency, and power consumption. Moreover, how they are affected by the number of attackers in the network are analyzed. To the best of the authors’ knowledge, this is the first study that comprehensively explores RPL objective functions on networks under
安全视角下RPL目标函数分析
低功耗网络IPv6路由协议(RPL)是由资源受限的物联网(IoT)设备组成的有损网络的标准化路由协议之一。RPL允许根据不同的路由指标(如期望传输计数(ETX)、跳数和能量)使用不同的目标函数来确定有效的路由。在文献中,目标函数0 (OF0)和带滞后最小秩目标函数(MRHOF)这两个目标函数的性能得到了全面的评价,因为它们是RPL中公认的标准目标函数。然而,他们在遭受攻击时的表现还没有得到全面的评价。尽管RPL已经为其安全性定义了一些规范,但它仍然容易受到内部攻击,这可能会极大地影响网络性能。因此,本研究探讨了目标函数的性能如何受到RPL特定攻击的影响。版本号、DIS泛洪和最恶劣的父攻击通过使用以下性能指标进行分析:数据包传递率、开销、延迟和功耗。分析了网络中攻击者数量对它们的影响。据作者所知,这是第一个全面探讨RPL目标函数的研究
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信