Back to Search
Start Over
A Study of RPL DODAG Version Attacks
- Source :
- Monitoring and Securing Virtualized Networks and Services ISBN: 9783662438619, AIMS, Lecture Notes in Computer Science, 8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), 8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.92-104, ⟨10.1007/978-3-662-43862-6_12⟩
- Publication Year :
- 2014
- Publisher :
- Springer Berlin Heidelberg, 2014.
-
Abstract
- Best Paper Award; International audience; The IETF designed the Routing Protocol for Low power and Lossy Networks (RPL) as a candidate for use in constrained networks. Keeping in mind the different requirements of such networks, the protocol was designed to support multiple routing topologies, called DODAGs, constructed using different objective functions, so as to optimize routing based on divergent metrics. A DODAG versioning system is incorporated into RPL in order to ensure that the topology does not become stale and that loops are not formed over time. However, an attacker can exploit this versioning system to gain an advantage in the topology and also acquire children that would be forced to route packets via this node. In this paper we present a study of possible attacks that exploit the DODAG version system. The impact on overhead, delivery ratio, end-to-end delay, rank inconsistencies and loops is studied.
- Subjects :
- Routing protocol
Exploit
business.industry
Computer science
Network packet
Node (networking)
020206 networking & telecommunications
02 engineering and technology
Network topology
[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]
0202 electrical engineering, electronic engineering, information engineering
Overhead (computing)
020201 artificial intelligence & image processing
Routing (electronic design automation)
business
Protocol (object-oriented programming)
Computer network
Subjects
Details
- ISBN :
- 978-3-662-43861-9
- ISBNs :
- 9783662438619
- Database :
- OpenAIRE
- Journal :
- Monitoring and Securing Virtualized Networks and Services ISBN: 9783662438619, AIMS, Lecture Notes in Computer Science, 8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), 8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.92-104, ⟨10.1007/978-3-662-43862-6_12⟩
- Accession number :
- edsair.doi.dedup.....883c20e9e2394c953980a211301d5e71