Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion

Author:

Belkhira Hichem Sid Ahmed1,Belkheir Mohammed2,Rouissat Mehdi13,Mokaddem Allel2,Lorenz Pascal4,Boukhobza Mohamed Achraf2,Salmi Abdelhamid1,Kouar Ahmed1

Affiliation:

1. Department of Computer Science, Univeristy Center Nour Bachir , El-Bayadh , Algeria

2. LIMA Laboratory, Univeristy Center Nour Bachir , El-Bayadh , Algeria

3. STIC Laboratory, University Aboubekr Belkaid , Tlemcen , Algeria

4. MIPS Laboratory, University of Haute Alsace , Mulhouse , France

Abstract

Abstract The security landscape of Internet of Things (IoT) networks continues to draw significant attention from recent networks; the Version Number Attack (VNA) stands out as a prominent threat to IoT network resources. Routing Protocol for Low-Power and Lossy Network structures low-power and lossy networks through one or more Destination Oriented Directed Acyclic Graphs (DODAGs). Each DODAG is assigned a version number, serving the purpose of ensuring the existence of loop-free paths to the root node. In the event of any inconsistency detected by the root node, the version number is incremented, triggering a global repair process and the reconstruction of the Directed Acyclic Graph. A potential security concern arises when a malicious node advertises a false version number in its control message, compelling the initiation of a global repair process. This study conducts a comprehensive analysis of the VNA’s impact, considering various parameters that have not been explored in previous research articles. These parameters include an examination of the additional forwarding tasks introduced by the attack and an exploration of factors contributing to node hyperactivity (such as loops, local and global repairs, etc.). The article delves into the specific control messages that result in the detrimental effects of the attack, offering a detailed analysis of control overhead, energy consumption, Packet Delivery Ratio, and latency. The obtained results show that the DAO (Destination Advertisement Object) messages dominate the total control overhead and are the main contributor to the total consumer energy, where the closest the malicious node to the sink the more damaging is the attack.

Publisher

Walter de Gruyter GmbH

Subject

Library and Information Sciences

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3