Mobility-Aware RPL Network Assessment under a Blackhole Attack

Saloua Ibrahimy, Hanane Lamaazi, Nabil Benamar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The speedy evolution of IoT technology is leading to a large-scale deployment of Low power and Lossy Networks (LLN). These constrained networks rely on tiny devices with limited computing and storage capabilities that connect to the internet using mainly the RPL routing protocol. However, this protocol can be an easy prey for attackers that can disrupt the network and degrade its performances by means of modification, isolation, or injection of malicious information. In this paper, we identify the impact of malicious nodes on mobile RPL-based networks by integrating a blackhole attack. The current study is benchmarked with static RPL networks in normal conditions. A set of routing metrics are evaluated, including resource consumption, control messages, and network stability. Our study highlights the degradation of network performances in a static environment compared to a mobile network in the presence of misbehaving (attackers) nodes.

Original languageEnglish
Title of host publication2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages541-546
Number of pages6
ISBN (Electronic)9781665451932
DOIs
Publication statusPublished - 2022
Event2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2022 - Virtual, Online, Bahrain
Duration: Nov 20 2022Nov 21 2022

Publication series

Name2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2022

Conference

Conference2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2022
Country/TerritoryBahrain
CityVirtual, Online
Period11/20/2211/21/22

Keywords

  • Blackhole Attack
  • COOJA
  • IoT
  • LLNs
  • Mobility Models
  • RPL

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Information Systems and Management
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Mobility-Aware RPL Network Assessment under a Blackhole Attack'. Together they form a unique fingerprint.

Cite this