Research breakthrough possible @S-Logix pro@slogix.in

Office Address

Social List

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks - 2017

Performance Evaluation Of RPL Protocol Under Mobile Sybil Attacks

Research Area:  Internet of Things

Abstract:

In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for Internet of Things (IoT) applications. In this paper we implemented and evaluated the performance of RPL (Routing Protocol for Low-Power and Lossy Networks) routing protocol under mobile sybil attacks, namely SybM, with respect to control overhead, packet delivery and energy consumption. In SybM attacks, Sybil nodes take the advantage of their mobility and the weakness of RPL to handle identity and mobility, to flood the network with fake control messages from different locations. To counter these type of attacks we propose a trust-based intrusion detection system based on RPL.

Keywords:  

Author(s) Name:  Faiza Medjek,Djamel Tandjaoui,Imed Romdhani and Nabil Djedjig

Journal name:  

Conferrence name:  IEEE Trustcom/BigDataSE/ICESS

Publisher name:  IEEE

DOI:  10.1109/Trustcom/BigDataSE/ICESS.2017.351

Volume Information: