The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks
Christopher Mitchel1, Baraq Ghaleb2, Safwan M. Ghaleb3, Zakwan Jaroucheh4, Bander Ali Saleh Al-rimy5
1Christopher Mitchel*, School of Computing at Edinburgh Napier University, 10 Colinton Road, Edinburgh, EH10 5DT, UK,
2Baraq Ghaleb, School of Computing at Edinburgh Napier University, 10 Colinton Road, Edinburgh, EH10 5DT, UK,
3Safwan M. Ghaleb, Faculty of Ocean Engineering Technology and Informatic, University Malaysia Terengganu,
4Zakwan Jaroucheh, School of Computing at Edinburgh Napier University, 10 Colinton Road, Edinburgh, EH10 5DT, UK,
5Bander Ali Saleh Al-rimy, Faculty of Business and Technology, UNITAR International University, Selangor 47301, Malaysia,
Manuscript received on December 02, 2020. | Revised Manuscript received on December 05, 2020. | Manuscript published on December 30, 2020. | PP: 66-72 | Volume-10 Issue-2, December 2020. | Retrieval Number: 100.1/ijeat.B19621210220 | DOI: 10.35940/ijeat.B1962.1210220
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: With a predicted 50 billion devices by the end of 2020, the Internet of things has grown exponentially in the last few years. This growth has seen an increasing demand for mobility support in low power and lossy sensor networks, a type of network characterized by several limitations in terms of their resources including CPU, memory and batter, causing manufactures to push products out to the market faster, without the necessary security features. IoT networks rely on the Routing Protocol for Low Power and Lossy Network (RPL) for communication, designed by the Internet Engineering Task Force (IETF). This protocol has been proven to be efficient in relation to the handling of routing in such constrained networks, However, research studies revealed that RPL was inherently designed for static networks, indicating poor handling of mobile or dynamic topologies which is worsen when introducing mobile attacker. In this paper, two IoT routing attacks are evaluated under a mobile attacker with the aim of providing a critical evaluation of the impact the attacks have on the network in comparison to the case with static attacker. The first attack is the Rank attack in which the attacker announces false routing information to its neighbour attracting them to forward their data via the attacker. The second attack is the DIS attack in which the attacker floods the network with DIS messages triggering them to reset their transmission timers and sending messages more frequently. The comparison were conducted in terms of average power consumption and also the packet delivery ratio (PDR). Based on the results collected from the simulations, it was established that when an attacking node is mobile, there’s an average increase of 36.6 in power consumption and a decrease of 14 for packet delivery ratios when compared to a static attacking node.
Keywords: DIS attack, Internet-of-Things; IoT attacks, Mobile attacker, Rank attack.
Scope of the Article: Internet of Things