Visible to the public Performance Evaluation of RPL Protocol under Mobile Sybil Attacks

TitlePerformance Evaluation of RPL Protocol under Mobile Sybil Attacks
Publication TypeConference Paper
Year of Publication2017
AuthorsMedjek, F., Tandjaoui, D., Romdhani, I., Djedjig, N.
Conference Name2017 IEEE Trustcom/BigDataSE/ICESS
Date Publishedaug
ISBN Number978-1-5090-4906-6
Keywordscomposability, computer network performance evaluation, computer network security, control overhead, energy consumption, fake control messages, Internet of Things, Internet of Things applications, IoT, IoT security, mobile computing, mobile nodes, mobile sybil attacks, Network topology, packet delivery, performance evaluation, physical adversary, power aware computing, pubcrawl, resilience, Resiliency, Routing, routing protocol for low-power and lossy networks, Routing protocols, routing security, RPL, RPL protocol, Scalability, stolen identities, Sybil attack, SybM, Topology, Trust Routing, trust-based intrusion detection system

In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for Internet of Things (IoT) applications. In this paper we implemented and evaluated the performance of RPL (Routing Protocol for Low-Power and Lossy Networks) routing protocol under mobile sybil attacks, namely SybM, with respect to control overhead, packet delivery and energy consumption. In SybM attacks, Sybil nodes take the advantage of their mobility and the weakness of RPL to handle identity and mobility, to flood the network with fake control messages from different locations. To counter these type of attacks we propose a trust-based intrusion detection system based on RPL.

Citation Keymedjek_performance_2017