A Modified version number attack against RPL based networks
No Thumbnail Available
Date
2021
Journal Title
Journal ISSN
Volume Title
Publisher
University of Oum El Bouaghi
Abstract
Routing Protocol for Low Power and Lossy Networks (RPL) has been proposed to efficiently manage the different functions of the network layer for wireless sensor networks when providing Internet connectivity. RPL has been designed for constrained devices and networks. Owing to their
constrained power, memory, and processing, RPL-based networks are exposed to a wide range of security attacks that mainly include control message tampering. In this paper, we present a new modified Version Number attack, called Decreased Version Number Attack (DVNA), where the idea behind it is that the version number is decreased instead of increased as in the traditional version number attack. The aim of the attack is to initialize continually the trickle timer of the malicious node's neighbors, which leads to unnecessary exchange of control messages, therefore exhausts the resources of the nodes and reduce the network lifetime. The obtained results show an increase of up to 71% in the exchanged control messages and an increase of up to 47.77 % in energy consumption.
Description
Keywords
RPL; Security; DVNA; resources; Version number