Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion
Author:
Belkhira Hichem Sid Ahmed1, Belkheir Mohammed2, Rouissat Mehdi13, Mokaddem Allel2, Lorenz Pascal4, Boukhobza Mohamed Achraf2, Salmi Abdelhamid1, Kouar Ahmed1
Affiliation:
1. Department of Computer Science, Univeristy Center Nour Bachir , El-Bayadh , Algeria 2. LIMA Laboratory, Univeristy Center Nour Bachir , El-Bayadh , Algeria 3. STIC Laboratory, University Aboubekr Belkaid , Tlemcen , Algeria 4. MIPS Laboratory, University of Haute Alsace , Mulhouse , France
Abstract
Abstract
The security landscape of Internet of Things (IoT) networks continues to draw significant attention from recent networks; the Version Number Attack (VNA) stands out as a prominent threat to IoT network resources. Routing Protocol for Low-Power and Lossy Network structures low-power and lossy networks through one or more Destination Oriented Directed Acyclic Graphs (DODAGs). Each DODAG is assigned a version number, serving the purpose of ensuring the existence of loop-free paths to the root node. In the event of any inconsistency detected by the root node, the version number is incremented, triggering a global repair process and the reconstruction of the Directed Acyclic Graph. A potential security concern arises when a malicious node advertises a false version number in its control message, compelling the initiation of a global repair process. This study conducts a comprehensive analysis of the VNA’s impact, considering various parameters that have not been explored in previous research articles. These parameters include an examination of the additional forwarding tasks introduced by the attack and an exploration of factors contributing to node hyperactivity (such as loops, local and global repairs, etc.). The article delves into the specific control messages that result in the detrimental effects of the attack, offering a detailed analysis of control overhead, energy consumption, Packet Delivery Ratio, and latency. The obtained results show that the DAO (Destination Advertisement Object) messages dominate the total control overhead and are the main contributor to the total consumer energy, where the closest the malicious node to the sink the more damaging is the attack.
Publisher
Walter de Gruyter GmbH
Reference43 articles.
1. Aghaie, A., Kermani, M. M., & Azarderakhsh, R. (2016). Fault diagnosis schemes for low-energy block cipher Midori benchmarked on FPGA. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 25(4), 1528–1536. 2. Al-Amiedy, T. A., Anbar, M., Belaton, B., Bahashwan, A. A., Hasbullah, I. H., Aladaileh, M. A., & Mukhaini, G. A. (2023). A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things. Internet of Things, 22, 100741. doi: 10.1016/j.iot.2023.100741. 3. Ali, J., Zafar, M. H., Hewage, C., Hassan, S. R., & Asif, R. (2023). The advents of ubiquitous computing in the development of smart cities – A review on the internet of things (IoT). Electronics, 12(4), 1032. 4. Al-Rawashdeh, M., Keikhosrokiani, P., Belaton, B., Alawida, M., & Zwiri, A. (2022). IoT adoption and application for smart healthcare: A systematic review. Sensors, 22(14), 5377. 5. Alsukayti, I. S., & Alreshoodi, M. (2023). RPL-based IoT networks under simple and complex routing security attacks: An experimental study. Applied Sciences, 13(8), 4878.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|