GLOBECOM 2020 - 2020 IEEE Global Communications Conference 2020
DOI: 10.1109/globecom42002.2020.9322275
|View full text |Cite
|
Sign up to set email alerts
|

Divide and Conquer-based Attack against RPL Routing Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…The estimation of the global energy consumption was measured by applying the following equations: 5 Energy=()CurrentCom+CurrentCPURtimerSecondVoltage where CurrentCom=false(TxcurTxfalse)+false(RxcurRxfalse) and CurrentCPU=false(CpucurCpufalse)+false(CpuIdlecurCpuIdlefalse) where RtimerSecond is a constant value of tick duration in the selected platform, cur is the current and ( T x , R x , Cpu , CpuIdle ) are values obtained from the Energest function which is predefined in Cooja (Energest_flush()). The Tx and Rx estimate the number of ticks of transmission and receive in the radio respectively.…”
Section: Evaluation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The estimation of the global energy consumption was measured by applying the following equations: 5 Energy=()CurrentCom+CurrentCPURtimerSecondVoltage where CurrentCom=false(TxcurTxfalse)+false(RxcurRxfalse) and CurrentCPU=false(CpucurCpufalse)+false(CpuIdlecurCpuIdlefalse) where RtimerSecond is a constant value of tick duration in the selected platform, cur is the current and ( T x , R x , Cpu , CpuIdle ) are values obtained from the Energest function which is predefined in Cooja (Energest_flush()). The Tx and Rx estimate the number of ticks of transmission and receive in the radio respectively.…”
Section: Evaluation Resultsmentioning
confidence: 99%
“…The latter remains vulnerable to several types of attacks, such as attacks addressing rank values. In this section, a detection and elimination solution using a trust threshold in order to detect the attack against the rank value presented in Boudouaia et al 5 is proposed. The detection scheme does not have a significant impact on the overall power consumption or the lifetime of the network, because it uses the messages and the routing information of the original RPL protocol.…”
Section: Our Contributionmentioning
confidence: 99%
“…Other consequences of this attack appeared in the form of degrading the quality of routing services by reducing PDR and network path stretch [17], [66]. In addition, other studies have highlighted the DIO suppression attack as an attack that forces nodes to update their routing tables with outdated and wrong data [13], [17], [22], [26], [67]. To illustrate the impact of DIO suppression attacks, we evaluate only the suppressing feature and its impact.…”
Section: ) Frequent Dio Replay Attacksmentioning
confidence: 99%
“…In (4) reviewed different types of network attacks in the RPL protocol. In (5) proposed a mechanism based on the divide and conquer method to identify pre-defined malicious nodes. This mechanism identified the various vulnerabilities in the traditional RPL protocol.…”
Section: Introductionmentioning
confidence: 99%