RPL Assessment using the Rank Attack in Static and Mobile Environments

Saloua Ibrahimy, Hanane Lamaazi, Nabil Benamar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

Routing protocol running over low power and lossy networks (RPL) is currently one of the main routing protocols for the Internet of Things (IoT). This protocol has some vulnerabilities that can be exploited by attackers to change its behavior and deteriorate its performance. In the RPL rank attack, a malicious node announces a wrong rank, which leads the neighboring's nodes to choose this node as a preferred parent. In this study, we used different metrics to assess RPL protocol in the presence of misbehaving nodes, namely the overhead, convergence time, energy consumption, preferred parent changes, and network lifetime. Our simulations results show that a mobile environment is more damaged by the rank attack than a static environment.

Original languageEnglish
Title of host publication2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies, 3ICT 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728196732
DOIs
Publication statusPublished - Dec 20 2020
Externally publishedYes
Event2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies, 3ICT 2020 - Sakheer, Bahrain
Duration: Dec 20 2020Dec 21 2020

Publication series

Name2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies, 3ICT 2020

Conference

Conference2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies, 3ICT 2020
Country/TerritoryBahrain
CitySakheer
Period12/20/2012/21/20

Keywords

  • IoT
  • Mobile environment
  • Mobility
  • Rank Attack
  • RPL
  • Static environment

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'RPL Assessment using the Rank Attack in Static and Mobile Environments'. Together they form a unique fingerprint.

Cite this