Multicast DIS attack mitigation in RPL-based IoT-LLNs

dc.contributor.authorMedjek, Faiza
dc.contributor.authorTandjaoui, Djamel
dc.contributor.authorDjedjig, Nabil
dc.contributor.authorRomdhani, Imed
dc.date.accessioned2023-10-05T18:50:41Z
dc.date.available2023-10-05T18:50:41Z
dc.date.issued2021-09
dc.description.abstractThe IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was standardised by the IETF ROLL Working Group to address the routing issues in the Internet of Things (IoT) Low-Power and Lossy Networks (LLNs). RPL builds and maintains a Destination Oriented Directed Acyclic Graph (DODAG) topology using pieces of information propagated within the DODAG Information Object (DIO) control message. When a node intends to join the DODAG, it either waits for DIO or sends a DODAG Information Solicitation (DIS) control message Multicast to solicit DIOs from nearby nodes. Nevertheless, sending Multicast DIS messages resets the timer that regulates the transmission rate of DIOs to its minimum value, which leads to the network’s congestion with control messages. Because of the resource-constrained nature of RPL-LLNs, the lack of tamper resistance, and the security gaps of RPL, malicious nodes can exploit the Multicast DIS solicitation mechanism to trigger an RPL-specification-based attack, named DIS attack. The DIS attack can have severe consequences on RPL networks, especially on control packets overhead and power consumption. In this paper, we use the Cooja–Contiki simulator to assess the DIS attack’s effects on both static and dynamic PRL networks. Besides, we propose and implement a novel approach, namely RPL-MRC, to improve the RPL’s resilience against DIS Multicast. RPL-MRC aims to reduce the response to DIS Multicast messages. Simulation results demonstrate how the attack could damage the network performance by significantly increasing the control packets overhead and power consumption. On the other hand, the RPL-MRC proposed mechanism shows a significant enhancement in reducing the control overhead and power consumption for different scenarios.
dc.identifier.doihttps://doi.org/10.1016/j.jisa.2021.102939
dc.identifier.issn2214-2126
dc.identifier.urihttps://dl.cerist.dz/handle/CERIST/984
dc.publisherElsevier
dc.relation.ispartofseriesJournal of Information Security and Applications; Vol 61
dc.relation.pages11 p.
dc.structureSécurité des systèmes et applications
dc.subjectRPL
dc.subjectRPL security
dc.subjectInternet of Things
dc.subjectDIS attack
dc.subjectRouting attacks
dc.subjectLow Power and Lossy Networks
dc.titleMulticast DIS attack mitigation in RPL-based IoT-LLNs
dc.typeArticle
Files