全面研究物联网网络中的版本号攻击:节点过度活跃作为具体标准

Q2 Social Sciences
H. S. A. Belkhira, M. Belkheir, M. Rouissat, A. Mokaddem, Pascal Lorenz, Mohamed Achraf Boukhobza, Abdelhamid Salmi, Ahmed Kouar
{"title":"全面研究物联网网络中的版本号攻击:节点过度活跃作为具体标准","authors":"H. S. A. Belkhira, M. Belkheir, M. Rouissat, A. Mokaddem, Pascal Lorenz, Mohamed Achraf Boukhobza, Abdelhamid Salmi, Ahmed Kouar","doi":"10.1515/opis-2022-0165","DOIUrl":null,"url":null,"abstract":"\n The security landscape of Internet of Things (IoT) networks continues to draw significant attention from recent networks; the Version Number Attack (VNA) stands out as a prominent threat to IoT network resources. Routing Protocol for Low-Power and Lossy Network structures low-power and lossy networks through one or more Destination Oriented Directed Acyclic Graphs (DODAGs). Each DODAG is assigned a version number, serving the purpose of ensuring the existence of loop-free paths to the root node. In the event of any inconsistency detected by the root node, the version number is incremented, triggering a global repair process and the reconstruction of the Directed Acyclic Graph. A potential security concern arises when a malicious node advertises a false version number in its control message, compelling the initiation of a global repair process. This study conducts a comprehensive analysis of the VNA’s impact, considering various parameters that have not been explored in previous research articles. These parameters include an examination of the additional forwarding tasks introduced by the attack and an exploration of factors contributing to node hyperactivity (such as loops, local and global repairs, etc.). The article delves into the specific control messages that result in the detrimental effects of the attack, offering a detailed analysis of control overhead, energy consumption, Packet Delivery Ratio, and latency. The obtained results show that the DAO (Destination Advertisement Object) messages dominate the total control overhead and are the main contributor to the total consumer energy, where the closest the malicious node to the sink the more damaging is the attack.","PeriodicalId":32626,"journal":{"name":"Open Information Science","volume":"38 13","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion\",\"authors\":\"H. S. A. Belkhira, M. Belkheir, M. Rouissat, A. Mokaddem, Pascal Lorenz, Mohamed Achraf Boukhobza, Abdelhamid Salmi, Ahmed Kouar\",\"doi\":\"10.1515/opis-2022-0165\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\n The security landscape of Internet of Things (IoT) networks continues to draw significant attention from recent networks; the Version Number Attack (VNA) stands out as a prominent threat to IoT network resources. Routing Protocol for Low-Power and Lossy Network structures low-power and lossy networks through one or more Destination Oriented Directed Acyclic Graphs (DODAGs). Each DODAG is assigned a version number, serving the purpose of ensuring the existence of loop-free paths to the root node. In the event of any inconsistency detected by the root node, the version number is incremented, triggering a global repair process and the reconstruction of the Directed Acyclic Graph. A potential security concern arises when a malicious node advertises a false version number in its control message, compelling the initiation of a global repair process. This study conducts a comprehensive analysis of the VNA’s impact, considering various parameters that have not been explored in previous research articles. These parameters include an examination of the additional forwarding tasks introduced by the attack and an exploration of factors contributing to node hyperactivity (such as loops, local and global repairs, etc.). The article delves into the specific control messages that result in the detrimental effects of the attack, offering a detailed analysis of control overhead, energy consumption, Packet Delivery Ratio, and latency. The obtained results show that the DAO (Destination Advertisement Object) messages dominate the total control overhead and are the main contributor to the total consumer energy, where the closest the malicious node to the sink the more damaging is the attack.\",\"PeriodicalId\":32626,\"journal\":{\"name\":\"Open Information Science\",\"volume\":\"38 13\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Open Information Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1515/opis-2022-0165\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Open Information Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1515/opis-2022-0165","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0

摘要

最近,物联网(IoT)网络的安全形势继续引起人们的高度关注;版本号攻击(VNA)作为对物联网网络资源的一个突出威胁而备受瞩目。低功耗和有损网络的路由协议通过一个或多个面向目的地的有向无环图(DODAG)来构建低功耗和有损网络。每个 DODAG 都有一个版本号,目的是确保存在通往根节点的无环路路径。如果根节点检测到任何不一致,版本号就会递增,从而触发全局修复过程并重建有向无环图。如果恶意节点在其控制信息中发布虚假版本号,迫使启动全局修复过程,就会产生潜在的安全问题。本研究对 VNA 的影响进行了全面分析,考虑了以往研究文章未曾探讨过的各种参数。这些参数包括对攻击带来的额外转发任务的检查,以及对导致节点过度活跃的因素(如循环、局部和全局修复等)的探讨。文章深入研究了导致攻击产生有害影响的特定控制信息,对控制开销、能耗、数据包传送比和延迟进行了详细分析。研究结果表明,DAO(目的地广告对象)消息在总控制开销中占主导地位,也是造成总能耗的主要因素,其中恶意节点离汇集点越近,攻击的破坏性就越大。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion
The security landscape of Internet of Things (IoT) networks continues to draw significant attention from recent networks; the Version Number Attack (VNA) stands out as a prominent threat to IoT network resources. Routing Protocol for Low-Power and Lossy Network structures low-power and lossy networks through one or more Destination Oriented Directed Acyclic Graphs (DODAGs). Each DODAG is assigned a version number, serving the purpose of ensuring the existence of loop-free paths to the root node. In the event of any inconsistency detected by the root node, the version number is incremented, triggering a global repair process and the reconstruction of the Directed Acyclic Graph. A potential security concern arises when a malicious node advertises a false version number in its control message, compelling the initiation of a global repair process. This study conducts a comprehensive analysis of the VNA’s impact, considering various parameters that have not been explored in previous research articles. These parameters include an examination of the additional forwarding tasks introduced by the attack and an exploration of factors contributing to node hyperactivity (such as loops, local and global repairs, etc.). The article delves into the specific control messages that result in the detrimental effects of the attack, offering a detailed analysis of control overhead, energy consumption, Packet Delivery Ratio, and latency. The obtained results show that the DAO (Destination Advertisement Object) messages dominate the total control overhead and are the main contributor to the total consumer energy, where the closest the malicious node to the sink the more damaging is the attack.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Open Information Science
Open Information Science Social Sciences-Library and Information Sciences
CiteScore
1.40
自引率
0.00%
发文量
7
审稿时长
8 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信