Research Output

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks

  In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of Things (IoT) applications. In this paper we implemented and evaluated the performance of RPL (Routing Protocol for Low-Power and Lossy Networks) routing protocol under mobile sybil attacks, namely SybM, with respect to control overhead, packet delivery and energy consumption. In SybM attacks, Sybil nodes take the advantage of their mobility and the weakness of RPL to handle identity and mobility, to flood the network with fake control messages from different locations. To counter these type of attacks we proposed a trust-based intrusion detection system by extending the RPL protocol

  • Date:

    01 August 2017

  • Publication Status:

    Published

  • Publisher

    Institute of Electrical and Electronics Engineers

  • DOI:

    10.1109/trustcom/bigdatase/icess.2017.351

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    004 Data processing & computer science

  • Funders:

    Edinburgh Napier Funded

Citation

Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017). Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESSdoi:10.1109/trustcom/bigdatase/icess.2017.351

Authors

Keywords

Internet of Things, RPL, IoT, Security, Sybil Attacks

Monthly Views:

Available Documents

  • pdf

    Performance evaluation of RPL protocol under mobile sybil attacks

    1MB
    Number of Downloads in the past year: 12

    © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

  • Downloadable citations

    HTML BIB RTF