Addressing the DAO Insider Attack in RPL’s Internet of Things Networks

Baraq Ghaleb, Ahmed Al-Dubai, Elias Ekonomou, Mamoun Qasem, Imed Romdhani, Lewis Mackenzie

    Research output: Contribution to journalArticlepeer-review

    41 Downloads (Pure)

    Abstract

    In RPL routing protocol, the destination advertisement object (DAO) control messages are announced by the child nodes to their parents to build downward routes. A malicious insider node can exploit this feature to send fake DAOs to its parents periodically, triggering those parents, in turn, to forward the fake messages upward to the root node. In this letter, we show how this behavior can have a detrimental side effect on the performance of the network, increasing power consumption, latency, and reducing reliability. To address this problem, a new scheme is introduced to mitigate significantly the effect of the DAO attack on network performance.
    Original languageEnglish
    Pages (from-to)68-71
    JournalIEEE Communications Letters
    Volume23
    Issue number1
    DOIs
    Publication statusPublished - 1 Jan 2019

    Keywords

    • Internet of Things
    • low-power and lossy networks
    • RPL security
    • DAO attack

    Fingerprint

    Dive into the research topics of 'Addressing the DAO Insider Attack in RPL’s Internet of Things Networks'. Together they form a unique fingerprint.

    Cite this