Affiliation:
1. Electronics and Micro-Electronics Laboratory, Physic Department, Faculty of Sciences of Monastir, University of Monastir, Monastir 5000, Tunisia
2. Department of Science and Technology, College of Ranyah, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
Abstract
The RPL protocol is essential for efficient communication within the Internet of Things (IoT) ecosystem, yet it remains vulnerable to various attacks, particularly in dense and mobile environments where it shows certain limitations and susceptibilities. This paper presents a comprehensive simulation-based analysis of the RPL protocol’s vulnerability to the Hello Flood attack in mobile environments. Using four different group mobility models—the Column Mobility Model (CMM), Reference Point Group Mobility Model (RPGM), Nomadic Community Mobility Model (NCM), and Pursue Mobility Model (PMM)—within the Cooja simulator, this study uniquely investigates the Hello Flood attack in mobile settings, an area previously overlooked. Our systematic evaluation focuses on critical performance metrics, including the Packet Delivery Ratio (PDR), End-to-End Delay (E2ED), throughput, Expected Transmission Count (ETX), and Average Power Consumption (APC). The findings reveal several key insights: PDR decreases significantly, indicating increased packet loss or delivery failures; ETX values rise, necessitating more packet retransmissions and routing hops; E2ED increases, introducing delays in routing decisions and data transmission times; throughput declines as the attack disrupts data flow; and APC escalates due to higher energy usage on packet transmissions, especially over extended paths. These results underscore the urgent need for robust security measures to protect RPL-based IoT networks in mobile environments. Furthermore, our work emphasizes the exacerbated impact of the attack in mobile scenarios, highlighting the evolving security requirements of IoT networks.
Reference20 articles.
1. Applications, merits and demerits of WSN with IoT: A detailed review;Murthy;Int. J. Auton. Adapt. Commun. Syst.,2024
2. A Survey: Specific Aspect of the RPL Protocol and its Enhancements;Vyas;Int. J. Intell. Syst. Appl. Eng.,2024
3. RPL-Based IoT Networks under Decreased Rank Attack: Performance Analysis in Static and Mobile Environments;Hkiri;Comput. Mater. Contin.,2024
4. Hussain, S.J., and Roopa, M. (2023, January 19–21). Evaluating the Impact of RPL Control Overhead on Network Performance. Proceedings of the 2nd International Conference on Edge Computing and Applications (ICECAA), Namakkal, India.
5. Hkiri, A., Karmani, M., and Machhout, M. (2022, January 22–25). The routing protocol for low power and lossy networks (RPL) under attack: Simulation and analysis. Proceedings of the 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET), Hammamet, Tunisia.