A Modified version number attack against RPL based networks

dc.contributor.authorRouissat, Mehdi
dc.contributor.authorBelkheir, Mohammed
dc.contributor.authorBelkhira, Hicham Sid Ahmed
dc.date.accessioned2025-04-20T17:06:12Z
dc.date.available2025-04-20T17:06:12Z
dc.date.issued2021
dc.description.abstractRouting Protocol for Low Power and Lossy Networks (RPL) has been proposed to efficiently manage the different functions of the network layer for wireless sensor networks when providing Internet connectivity. RPL has been designed for constrained devices and networks. Owing to their constrained power, memory, and processing, RPL-based networks are exposed to a wide range of security attacks that mainly include control message tampering. In this paper, we present a new modified Version Number attack, called Decreased Version Number Attack (DVNA), where the idea behind it is that the version number is decreased instead of increased as in the traditional version number attack. The aim of the attack is to initialize continually the trickle timer of the malicious node's neighbors, which leads to unnecessary exchange of control messages, therefore exhausts the resources of the nodes and reduce the network lifetime. The obtained results show an increase of up to 71% in the exchanged control messages and an increase of up to 47.77 % in energy consumption.
dc.identifier.urihttp://dspace.univ-oeb.dz:4000/handle/123456789/21912
dc.language.isoen
dc.publisherUniversity of Oum El Bouaghi
dc.subjectRPL; Security; DVNA; resources; Version number
dc.titleA Modified version number attack against RPL based networks
dc.typeArticle
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
A Modified Version Number Attack Against RPL.pdf
Size:
786.37 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: