Ghaleb, B., Al-Dubai, A.-D., Ekonomou, E., Qasem, M., Romdhani, I. and Mackenzie, L. (2019) Addressing the DAO insider attack in RPL’s internet of things networks. IEEE Communications Letters, 23(1), pp. 68-71. (doi: 10.1109/LCOMM.2018.2878151)
|
Text
180885.pdf - Accepted Version 525kB |
Abstract
In RPL routing protocol, the destination advertisement object (DAO) control messages are announced by the child nodes to their parents to build downward routes. A malicious insider node can exploit this feature to send fake DAOs to its parents periodically, triggering those parents, in turn, to forward the fake messages upward to the root node. In this letter, we show how this behavior can have a detrimental side effect on the performance of the network, increasing power consumption, latency, and reducing reliability. To address this problem, a new scheme is introduced to mitigate significantly the effect of the DAO attack on network performance.
Item Type: | Articles |
---|---|
Status: | Published |
Refereed: | Yes |
Glasgow Author(s) Enlighten ID: | Mackenzie, Dr Lewis |
Authors: | Ghaleb, B., Al-Dubai, A.-D., Ekonomou, E., Qasem, M., Romdhani, I., and Mackenzie, L. |
College/School: | College of Science and Engineering > School of Computing Science |
Journal Name: | IEEE Communications Letters |
Publisher: | IEEE |
ISSN: | 1089-7798 |
ISSN (Online): | 1558-2558 |
Published Online: | 26 October 2018 |
Copyright Holders: | Copyright © 2018 IEEE |
First Published: | First published in IEEE Communications Letters 23(1): 68-71 |
Publisher Policy: | Reproduced in accordance with the publisher copyright policy |
University Staff: Request a correction | Enlighten Editors: Update this record