2019
DOI: 10.1002/ett.3802
|View full text |Cite
|
Sign up to set email alerts
|

Mitigation of DIS flooding attacks in RPL‐based 6LoWPAN networks

Abstract: The IPv6 Routing Protocol for Low‐Power and Lossy Networks (RPL) is the de facto routing protocol for IPv6‐based Low‐Power Wireless Personal Area Networks (6LoWPAN). In RPL protocol, DODAG Information Solicitation (DIS) messages are sent by the node to join the network. A malicious node can exploit this mechanism to send illegitimate DIS messages to the neighbor nodes to perform a DIS flooding attack. In this research paper, it is observed that the DIS flooding attack increases the control packet overhead of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 45 publications
(29 citation statements)
references
References 61 publications
(67 reference statements)
0
29
0
Order By: Relevance
“…This type of attack can consume both outgoing and incoming bandwidth, since the victim’s servers will often attempt to respond with ICMP Echo Reply packets, resulting significant overall system slowdown. Thanks to the ContikiRPL configuration constants set with the building block, the malicious node immediately starts sending DIS messages to its neighbors as shown in Figure 7 [ 54 ], then triggering DIO messages and trickling timers reset.…”
Section: Anomaly Detection Scenariosmentioning
confidence: 99%
“…This type of attack can consume both outgoing and incoming bandwidth, since the victim’s servers will often attempt to respond with ICMP Echo Reply packets, resulting significant overall system slowdown. Thanks to the ContikiRPL configuration constants set with the building block, the malicious node immediately starts sending DIS messages to its neighbors as shown in Figure 7 [ 54 ], then triggering DIO messages and trickling timers reset.…”
Section: Anomaly Detection Scenariosmentioning
confidence: 99%
“…In 2019, Verma and Ranga [8] proposed a mitigation method for DIS flooding attacks. The main idea was to set thresholds in order to restrict trickle timer resets and decrease the number of control message transmissions caused by hello flood attack.…”
Section: Other Studiesmentioning
confidence: 99%
“…Most of them use fewer number of nodes while simulating the network [5,8] . However, in order to observe the effects of these attacks properly, higher number of nodes should be employed for the simulation.…”
Section: Analysis Of Routing Attacksmentioning
confidence: 99%
See 2 more Smart Citations