Research Area:  Internet of Things
In this work, we study the RPL version number attacks in-depth and analyze the attack from various points of view. The unique aspects of our work can be seen in our analysis of a realistic network topology that has both static and mobile nodes with different cardinalities for which our inspiration came from the IETF routing requirement documents. We also analyze how version number attack affects the power consumption of the nodes. We incorporated a probabilistic attacking model where the attacker attacks with a probability of p (e.g., 0, 0.3, 0.5, 0.7, 1). We also provide the performance results with respect to various values of p.
Author(s) Name:  Aris, Ahmet, Sema F. Oktug, and S. Berna Ors Yalcin
Conferrence name:  IEEE/IFIP Network Operations and Management Symposium
Publisher name:  IEEE
Paper Link:   https://ieeexplore.ieee.org/document/7502897