Addressing the DAO insider attack in RPL’s internet of things networks

Ghaleb, B., Al-Dubai, A.-D., Ekonomou, E., Qasem, M., Romdhani, I. and Mackenzie, L. (2019) Addressing the DAO insider attack in RPL’s internet of things networks. IEEE Communications Letters, 23(1), pp. 68-71. (doi:10.1109/LCOMM.2018.2878151)

[img]
Preview
Text
180885.pdf - Accepted Version

525kB

Abstract

In RPL routing protocol, the destination advertisement object (DAO) control messages are announced by the child nodes to their parents to build downward routes. A malicious insider node can exploit this feature to send fake DAOs to its parents periodically, triggering those parents, in turn, to forward the fake messages upward to the root node. In this letter, we show how this behavior can have a detrimental side effect on the performance of the network, increasing power consumption, latency, and reducing reliability. To address this problem, a new scheme is introduced to mitigate significantly the effect of the DAO attack on network performance.

Item Type:Articles
Status:Published
Refereed:Yes
Glasgow Author(s) Enlighten ID:Mackenzie, Dr Lewis
Authors: Ghaleb, B., Al-Dubai, A.-D., Ekonomou, E., Qasem, M., Romdhani, I., and Mackenzie, L.
College/School:College of Science and Engineering > School of Computing Science
Journal Name:IEEE Communications Letters
Publisher:IEEE
ISSN:1089-7798
ISSN (Online):1558-2558
Published Online:26 October 2018
Copyright Holders:Copyright © 2018 IEEE
First Published:First published in IEEE Communications Letters 23(1): 68-71
Publisher Policy:Reproduced in accordance with the publisher copyright policy

University Staff: Request a correction | Enlighten Editors: Update this record