Research Area:  Internet of Things
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for Internet of Things (IoT) applications. In this paper we implemented and evaluated the performance of RPL (Routing Protocol for Low-Power and Lossy Networks) routing protocol under mobile sybil attacks, namely SybM, with respect to control overhead, packet delivery and energy consumption. In SybM attacks, Sybil nodes take the advantage of their mobility and the weakness of RPL to handle identity and mobility, to flood the network with fake control messages from different locations. To counter these type of attacks we propose a trust-based intrusion detection system based on RPL.
Keywords:  
Author(s) Name:  Faiza Medjek,Djamel Tandjaoui,Imed Romdhani and Nabil Djedjig
Journal name:  
Conferrence name:  IEEE Trustcom/BigDataSE/ICESS
Publisher name:  IEEE
DOI:  10.1109/Trustcom/BigDataSE/ICESS.2017.351
Volume Information:  
Paper Link:   https://ieeexplore.ieee.org/abstract/document/8029554