Academic & Scientific Articles

Permanent URI for this communityhttp://dl.cerist.dz/handle/CERIST/3

Browse

Search Results

Now showing 1 - 4 of 4
  • Thumbnail Image
    Item
    Multicast DIS attack mitigation in RPL-based IoT-LLNs
    (Elsevier, 2021-09) Medjek, Faiza; Tandjaoui, Djamel; Djedjig, Nabil; Romdhani, Imed
    The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was standardised by the IETF ROLL Working Group to address the routing issues in the Internet of Things (IoT) Low-Power and Lossy Networks (LLNs). RPL builds and maintains a Destination Oriented Directed Acyclic Graph (DODAG) topology using pieces of information propagated within the DODAG Information Object (DIO) control message. When a node intends to join the DODAG, it either waits for DIO or sends a DODAG Information Solicitation (DIS) control message Multicast to solicit DIOs from nearby nodes. Nevertheless, sending Multicast DIS messages resets the timer that regulates the transmission rate of DIOs to its minimum value, which leads to the network’s congestion with control messages. Because of the resource-constrained nature of RPL-LLNs, the lack of tamper resistance, and the security gaps of RPL, malicious nodes can exploit the Multicast DIS solicitation mechanism to trigger an RPL-specification-based attack, named DIS attack. The DIS attack can have severe consequences on RPL networks, especially on control packets overhead and power consumption. In this paper, we use the Cooja–Contiki simulator to assess the DIS attack’s effects on both static and dynamic PRL networks. Besides, we propose and implement a novel approach, namely RPL-MRC, to improve the RPL’s resilience against DIS Multicast. RPL-MRC aims to reduce the response to DIS Multicast messages. Simulation results demonstrate how the attack could damage the network performance by significantly increasing the control packets overhead and power consumption. On the other hand, the RPL-MRC proposed mechanism shows a significant enhancement in reducing the control overhead and power consumption for different scenarios.
  • Thumbnail Image
    Item
    Trust management in IoT routing protocol
    (CERIST, 2015-04-19) Djedjig, Nabil; Tandjaoui, Djamel; Medjek, Faiza
    The Routing Protocol for Low-Power and Lossy Networks (RPL) is the routing protocol standardized for constrained environments such as 6LoWPAN networks, and is considered as the routing protocol of the Internet of Things (IoT). However, this protocol is subject to several internal and external attacks. In this paper, we investigate a trust management protocol in RPL. Our idea of trust management in RPL is to establish a dynamic trust relationship between the different nodes involved in routing. In fact, RPL organizes a logical representation of the network topology using control messages. In our proposed protocol, we strengthen RPL by adding a new trustworthiness metric during RPL construction and maintenance. This metric allows a node to decide whether or not to trust the other nodes during the construction of the topology.
  • Thumbnail Image
    Item
    Evaluation of the impacts of Sybil attacks against RPL under mobility
    (CERIST, 2014-06) Medjek, Faiza; Tandjaoui, Djamel; Djedjig, Nabil
    The Routing Protocol for Low-Power and Lossy Networks (RPL) is the routing protocol standardized for constrained environments such as 6LoWPAN networks, and is considered as the routing protocol of the Internet of Things (IoT). However, this protocol is subject to several attacks that have been analyzed on static case. Nevertheless, IoT will likely present dynamic and mobile applications. In this paper, we introduce potential security threats on RPL, in particular Sybil attacks when the Sybil nodes are mobile. In addition, we present an analysis and a discussion on how network performances can be affected. Our analysis shows, under Sybil attacks while nodes are mobile, that the performances of RPL are highly affected compared to the static case. In fact, we notice a decrease in the rate of packet delivery, and an increase in control messages overhead. As a result, energy consumption at constrained nodes increases. Our proposed attacks demonstrate that Sybil mobile nodes can easily disrupt RPL and overload the network with fake messages making it unavailable. Based on the obtained results we provide some recommendations to tackle this issue.
  • Thumbnail Image
    Item
    A Lightweight Key Management Scheme for E-health applications in the context of Internet of Things
    (CERIST, 2014-03-15) Abdmeziem, Riad; Tandjaoui, Djamel
    In the context of Internet of Things where real world objects will automatically be part of the Internet, ehealth applications have emerged as a promising approach to provide unobtrusive support for elderly and frail people based on their situation and circumstances. However, due to the limited resource available in such systems and privacy concerns that might rise from the capture of personal data, security issues constitute a major obstacle to their deployment. Authentication of the different entities involved and data confidentiality constitute the main concerns for users that need to be addressed. In this paper, we propose a new key management scheme for an ehealth application to allow sensors and the Base Station (BS) to negotiate certain security credentials that will be used to protect the information flow. Our prtocol provides a strong level of security guaranteeing authentication and data confidentiality while the scarcity of resources is taken into consideration. The scheme is based on a lightweight Public Key Infrastructure (PKI) where the sensors have to perform only one Elliptic Curve Cryptography (ECC) decryption in the key establishment process. Data exchanges are then secured by the use of symmetric encryption. In addition, Time Stamps are used to prevent replay attacks along with Message Code Authentication (MAC) to ensure integrity.