• français
    • English
  • français 
    • français
    • English
  • Ouvrir une session
  • CGU
  • -
  • About
  • -
  • Contact
  • -
  • Team
Voir le document 
  •   CERIST DL
  • Articles Scientifiques
  • Rapports de Recherche Internes
  • Voir le document
  •   CERIST DL
  • Articles Scientifiques
  • Rapports de Recherche Internes
  • Voir le document
JavaScript is disabled for your browser. Some features of this site may not work without it.

Parcourir

Tout DLCommunautés & CollectionsPar date de publicationAuteursTitresSujetsCette collectionPar date de publicationAuteursTitresSujets

Mon compte

Ouvrir une sessionS'inscrire

Evaluation of the impacts of Sybil attacks against RPL under mobility

Thumbnail
Voir/Ouvrir
Fichier principal (1.195Mo)
Auteur(s) :
Medjek, Faiza
Tandjaoui, Djamel
Djedjig, Nabil
Date :
2014-06
URI :
http://dl.cerist.dz/handle/CERIST/725
Résumé
The Routing Protocol for Low-Power and Lossy Networks (RPL) is the routing protocol standardized for constrained environments such as 6LoWPAN networks, and is considered as the routing protocol of the Internet of Things (IoT). However, this protocol is subject to several attacks that have been analyzed on static case. Nevertheless, IoT will likely present dynamic and mobile applications. In this paper, we introduce potential security threats on RPL, in particular Sybil attacks when the Sybil nodes are mobile. In addition, we present an analysis and a discussion on how network performances can be affected. Our analysis shows, under Sybil attacks while nodes are mobile, that the performances of RPL are highly affected compared to the static case. In fact, we notice a decrease in the rate of packet delivery, and an increase in control messages overhead. As a result, energy consumption at constrained nodes increases. Our proposed attacks demonstrate that Sybil mobile nodes can easily disrupt RPL and overload the network with fake messages making it unavailable. Based on the obtained results we provide some recommendations to tackle this issue.

Mots clés:

 RPL, Mobility, New internal threats, Sybil attacks, Performances, Internet of Things 

Source:

Rapports de recherche internes
ISRN :CERIST-DR/RR--15-000000012--DZ

Éditeur / Etablissement:

CERIST

Lieu:

Alger
Collections
  • Rapports de Recherche Internes [234]

Tous les documents dans CERIST DIGITAL LIBRARY sont protégés par copyright, avec tous droits réservés. copyright © 2013-2015  CERIST
Contactez-nous | Faire parvenir un commentaire
Powered by 
@mire NV
 

 


Tous les documents dans CERIST DIGITAL LIBRARY sont protégés par copyright, avec tous droits réservés. copyright © 2013-2015  CERIST
Contactez-nous | Faire parvenir un commentaire
Powered by 
@mire NV