2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP) 2020
DOI: 10.1109/csndsp49049.2020.9249612
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of a Wormhole Detection Method using Round-Trip Times and Hop Counts in RPL-Based 6LoWPAN Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 14 publications
0
1
0
Order By: Relevance
“…The experimental results presented in [30] demonstrated how RPL networks experienced a high delay, packet loss, and network overhead when being under blackhole attacks. The experimental study in [31] showed the adverse impact of the wormhole attack on the power consumption and network overhead of RPL networks. The same attack was investigated in [32] over a real-testbed setup.…”
Section: Related Workmentioning
confidence: 99%
“…The experimental results presented in [30] demonstrated how RPL networks experienced a high delay, packet loss, and network overhead when being under blackhole attacks. The experimental study in [31] showed the adverse impact of the wormhole attack on the power consumption and network overhead of RPL networks. The same attack was investigated in [32] over a real-testbed setup.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, routing attacks focus on distorting the routing information in order to cause a negative impact on the network. Examples of these attacks are version number attack, blackhole attack, greyhole attack, wormhole attack, and rank decrease attack [24,[27][28][29]. To detect the aforementioned attacks, IDSes are being studied and tested on RPL-based networks.…”
Section: Introductionmentioning
confidence: 99%
“…Other important attacks in RPL networks are wormhole and grayhole attacks. They can be detected using methods that rely on packet counts and round-trip times [5] as well as by implementing heartbeatbased protocols [6]. We have also designed and implemented an IDS prototype for protecting RPL networks and devices from battery-drain DoS attacks using rate thresholds [7].…”
Section: Introductionmentioning
confidence: 99%