Research Output
Addressing the DAO Insider Attack in RPL’s Internet of Things Networks
  In RPL routing protocol, the DAO (Destination Advertisement Object) control messages are announced by the child nodes to their parents to build downward routes. A malicious insider node can exploit this feature to send fake DAOs to its parents periodically, triggering those parents, in turn, to forward the fake messages upward to the root node. In this study, we show how this behaviour can have a detrimental side effect on the performance of the network, increasing power consumption, latency and reducing reliability. To address this problem, a new scheme is introduced to mitigate significantly the effect of the DAO attack on network performance.

  • Type:

    Article

  • Date:

    26 October 2018

  • Publication Status:

    Published

  • DOI:

    10.1109/LCOMM.2018.2878151

  • ISSN:

    1089-7798

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    621.3821 Communications Networks

  • Funders:

    Edinburgh Napier Funded

Citation

Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2018). Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Communications Letters, 23(1), 68-71. https://doi.org/10.1109/LCOMM.2018.2878151

Authors

Keywords

Modelling and Simulation; Electrical and Electronic Engineering; Computer Science Applications

Monthly Views:

Available Documents
  • pdf

    Addressing the DAO Insider Attack in RPL’s Internet of Things Networks

    191KB

    © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

  • Downloadable citations

    HTML BIB RTF