We study the DAO induction attack, a new attack against IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), the standard routing protocol for the Internet of Things (IoT). In the DAO induction attack, a compromised node in the network periodically transmits a special control message. Each of these crafted control messages induces many nodes in the network to transmit in response. We show that transmitting these unnecessary messages can significantly increase the power consumption of nodes, hence reduce the lifetime of battery-operated IoT devices. In addition, we show that the attack severely impacts end-to-end latency and packet delivery ratio, two important network performance metrics. For instance, in a network with 50 nodes, our simulation results show that the attack increases the average end-to-end latency and packet loss ratio by 410 percent and 260 percent, respectively. To counter the attack, we propose a lightweight solution. We show that our solution imposes no overhead when the network is in its normal operation (i.e., it is not under attack) and can quickly detect the attack even when the network experiences high packet loss rates.