2017 IEEE Trustcom/BigDataSE/Icess 2017
DOI: 10.1109/trustcom/bigdatase/icess.2017.351
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks

Abstract: Abstract-In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for Internet of Things (IoT) applications. In this paper we implemented and evaluated the performance of RPL routing protocol under mobile sybil attacks, namely SybM, with respect to control overhead, packet delivery and energy consumption. In SybM attacks, Sybil nodes take the advantage of their mobility and the weakness of RPL to handle identity … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(17 citation statements)
references
References 19 publications
0
16
0
1
Order By: Relevance
“…In [97], Medjek et al described how an attacker could throw a sybil attack against RPL-based network. They used and took advantage of an RPL feature to add a node to the network.…”
Section: Sybil Attackmentioning
confidence: 99%
“…In [97], Medjek et al described how an attacker could throw a sybil attack against RPL-based network. They used and took advantage of an RPL feature to add a node to the network.…”
Section: Sybil Attackmentioning
confidence: 99%
“…To ensure that the packet loss is due to misbehaviour and not due to bad channel quality, the nodes use one time retransmission techniques. Similarly, using the monitoring information of the nodes about the data packets forwarding, a trust-based intrusion detection system based on RPL is presented in [21], to countermeasure mobile sybil attacks in IoT networks.…”
Section: B Security Threats To Rpl and Its Related Protocolsmentioning
confidence: 99%
“…Thus, there is a need to find light-weight IDS. Medjek et al, [15] presented an analytical evaluation of Sybil attacks under mobility. This was the first theoretical study by the authors and no simulation results were provided.…”
Section: Recent Workmentioning
confidence: 99%