Performance Evaluation of DIO Suppression Attacks in RPL-Based IoT Networks
DOI:
https://doi.org/10.64882/ijrt.v13.i2.764Keywords:
IoT, RPL DIO suppression attack, NLBGNDOAbstract
Wireless Sensor Networks (WSNs) play a crucial role in a wide range of applications; however, their open and resource-constrained nature makes them vulnerable to various security attacks, which can significantly degrade network performance and reliability. One such attack is the DIO suppression (silencing) attack, which specifically targets the Routing Protocol for Low-Power and Lossy Networks (RPL). This study aims to investigate the impact of the DIO suppression attack on RPL performance and to evaluate the effectiveness of the NLBGNDO routing algorithm in mitigating this attack. To achieve this objective, a detailed and accurate model of the RPL protocol and the DIO suppression attack is developed within a simulation-based modeling framework. The proposed framework integrates the NLBGNDO algorithm, which is designed to enhance routing security and efficiency in RPL-based networks. Key performance metrics including packet delivery ratio, route stretch and energy consumption are measured and analyzed under both normal network conditions and attack scenarios. The results provide critical insights into the vulnerability of RPL to DIO suppression attacks and demonstrate the capability of the NLBGNDO algorithm to reduce their adverse effects. Specifically, the packet delivery ratio reflects the impact of the attack on data transmission reliability, while the route stretch metric evaluates routing efficiency under malicious conditions.
References
Ge Guo A Lightweight Countermeasure toDIS Attack in RPL Routing Protocol 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC)Year: 2021
Eric Garcia Ribera;Brian Martinez Alvarez;Charisma Samuel;Philokypros P. Ioulianou;Vassilios G. Vassilakis Heartbeat-Based Detection of Blackhole and Greyhole Attacks in RPL Networks 2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP) Year: 2020 |
Ruchi Mehta;M.M. Parmar Trust based mechanism for Securing IoT Routing Protocol RPL against Wormhole &Grayhole Attacks 2018 3rd International Conference for Convergence in Technology (I2CT) Year: 2018
Abdul Rehman;Meer Muhammad Khan;M. Ali Lodhi;Faisal Bashir Hussain Rank attack using objective function in RPL for low power and lossy networks 2016 International Conference on Industrial Informatics and Computer Systems (CIICS) Year: 2019 |
Syeda Mariam Muzammal;Raja Kumar Murugesan;Noor Zaman Jhanjhi;Low Tang Jung SMTrust: Proposing Trust-Based Secure Routing Protocol for RPL Attacks for IoT Applications 2020 International Conference on Computational Intelligence (ICCI)
Anhtuan Le;Jonathan Loo;Yuan Luo;Aboubaker Lasebae Specification-based IDS for securing RPL from topology attacks 2011 IFIP Wireless Days (WD) Year: 2019 |
Wijdan Choukri;Hanane Lamaazi;Nabil Benamar RPL rank attack detection using Deep Learning 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT) Year: 2020
David Airehrour;Jairo Gutierrez;Sayan Kumar Ray A testbed implementation of a trust-aware RPL routing protocol 2017 27th International Telecommunication Networks and Applications Conference (ITNAC) Year: 2019 |
Faraz Idris Khan;Taeshik Shon;Taekkyeun Lee;Kihyung Kim Wormhole attack prevention mechanism for RPL based LLN network 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN) Year: 2020 |
Fatima-tuz-Zahra;NZ Jhanjhi;Sarfraz Nawaz Brohi;Nazir A. Malik;Mamoona Humayun Proposing a Hybrid RPL Protocol for Rank and Wormhole Attack Mitigation using Machine Learning 2020 2nd International Conference on Computer and Information Sciences (ICCIS) Year: 2020 |
Abhay Deep Seth;Santosh Biswas;Amit Kumar Dhar Detection and Verification of Decreased Rank Attack using Round-Trip Times in RPL-Based 6LoWPAN Networks 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) Year: 2020 |
Amal Hkiri;Mouna Karmani;Mohsen Machhout The Routing Protocol for low power and lossy networks (RPL) under Attack: Simulation and Analysis 2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET) Year: 2022 |
Usha Kiran IDS To Detect Worst Parent Selection Attack In RPL-Based IoT Network 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS) Year: 2022
Haitham Y. Adarbah;Mostafa Farhadi Moghadam;Rolou Lyn Rodriguez Maata;Amirhossein Mohajerzadeh;Ali H. Al-Badi Security Challenges of Selective Forwarding Attack and Design a Secure ECDH-Based Authentication Protocol to Improve RPL Security mIEEE Access Year: 2023 |
Downloads
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.




