Browsing by Author "Belkheir, Mohammed"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item A Modified version number attack against RPL based networks(University of Oum El Bouaghi, 2021) Rouissat, Mehdi; Belkheir, Mohammed; Belkhira, Hicham Sid AhmedRouting Protocol for Low Power and Lossy Networks (RPL) has been proposed to efficiently manage the different functions of the network layer for wireless sensor networks when providing Internet connectivity. RPL has been designed for constrained devices and networks. Owing to their constrained power, memory, and processing, RPL-based networks are exposed to a wide range of security attacks that mainly include control message tampering. In this paper, we present a new modified Version Number attack, called Decreased Version Number Attack (DVNA), where the idea behind it is that the version number is decreased instead of increased as in the traditional version number attack. The aim of the attack is to initialize continually the trickle timer of the malicious node's neighbors, which leads to unnecessary exchange of control messages, therefore exhausts the resources of the nodes and reduce the network lifetime. The obtained results show an increase of up to 71% in the exchanged control messages and an increase of up to 47.77 % in energy consumption.Item A new lightweight approach to mitigate the version number attack in RPL-based IoT networks(University of Oum El Bouaghi, 2021) Belkheir, Mohammed; Rouissat, Mehdi; Belkhira, Hicham Sid AhmedIn the recent few years, the cybersecurity challenge stood out to the research community with the drastic evolution of IoT networks. The present article deals with the version number attack, a major security concern for IoT networks using RPL as routing protocol. Although a number of techniques have been proposed to mitigate this kind of attack, the main challenge of the proposed technique remains to contemplate the limited capabilities of the embedded devices composing the network in terms of computing, storage and energy. This makes decentralized heavy algorithms and cryptographic solutions not suitable to cope with the inherited resources of nodes and the network core routing operations. The main purpose of our present work is to implement a new lightweight approach aiming to reduce the destructive effect of the version number attack, whereby the node takes into consideration only the version number received from its preferred parent and ignores other versions of its neighborhood. This leads to propagate the same version number value of the root node over the entire network and ensures the network integrity, by reducing the repeated global repair process caused by falsified values of the version number. The proposed method is implemented under Contiki 3.0 operating system and simulations are performed using COOJA for different scenarios while changing the intruder node position in the network. The obtained results obviously depict that our proposed method yields better aftermath, where the energy saving is between 10% and 50%, depending on the intruder position, while the control overhead is between 2% and 50%.