Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Mitigation of topological inconsistency attacks in RPL‐based low‐power lossy networks

Identifieur interne : 000781 ( Main/Exploration ); précédent : 000780; suivant : 000782

Mitigation of topological inconsistency attacks in RPL‐based low‐power lossy networks

Auteurs : Anthéa Mayzaud [France] ; Anuj Sehgal [Allemagne] ; Rémi Badonnel [France] ; Isabelle Chrisment [France] ; Jürgen Schönw Lder [Allemagne]

Source :

RBID : ISTEX:A14407CFB9D429C8E5A536B45EA8663773ECC2BC

Abstract

The RPL is a routing protocol for low‐power and lossy networks. A malicious node can manipulate header options used by RPL to create topological inconsistencies, thereby causing denial of service attacks, reducing channel availability, increasing control message overhead, and increasing energy consumption at the targeted node and its neighborhood. RPL overcomes these topological inconsistencies via a fixed threshold, upon reaching which all subsequent packets with erroneous header options are ignored. However, this threshold value is arbitrarily chosen, and the performance can be improved by taking into account network characteristics. To address this, we present a mitigation strategy that allows nodes to dynamically adapt against a topological inconsistency attack based on the current network conditions. Results from our experiments show that our approach outperforms the fixed threshold and mitigates these attacks without significant overhead. Copyright © 2015 John Wiley & Sons, Ltd.
A malicious node in an RPL network can manipulate header options to create topological inconsistencies. These can lead to denial of service attacks, reduced channel availability, increased overhead and higher energy consumption. We present a mitigation strategy that allows nodes to dynamically adjust and adapt against such topological inconsistency attacks based on current network conditions. Results from our experiments show that our mitigation approach outperforms RPL's built‐in mechanism for mitigating topological inconsistency attacks.

Url:
DOI: 10.1002/nem.1898


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Mitigation of topological inconsistency attacks in RPL‐based low‐power lossy networks</title>
<author>
<name sortKey="Mayzaud, Anthea" sort="Mayzaud, Anthea" uniqKey="Mayzaud A" first="Anthéa" last="Mayzaud">Anthéa Mayzaud</name>
</author>
<author>
<name sortKey="Sehgal, Anuj" sort="Sehgal, Anuj" uniqKey="Sehgal A" first="Anuj" last="Sehgal">Anuj Sehgal</name>
</author>
<author>
<name sortKey="Badonnel, Remi" sort="Badonnel, Remi" uniqKey="Badonnel R" first="Rémi" last="Badonnel">Rémi Badonnel</name>
</author>
<author>
<name sortKey="Chrisment, Isabelle" sort="Chrisment, Isabelle" uniqKey="Chrisment I" first="Isabelle" last="Chrisment">Isabelle Chrisment</name>
</author>
<author>
<name sortKey="Schonw Lder, Jurgen" sort="Schonw Lder, Jurgen" uniqKey="Schonw Lder J" first="Jürgen" last="Schönw Lder">Jürgen Schönw Lder</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:A14407CFB9D429C8E5A536B45EA8663773ECC2BC</idno>
<date when="2015" year="2015">2015</date>
<idno type="doi">10.1002/nem.1898</idno>
<idno type="url">https://api.istex.fr/ark:/67375/WNG-2JTVLHGF-R/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002601</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">002601</idno>
<idno type="wicri:Area/Istex/Curation">002568</idno>
<idno type="wicri:Area/Istex/Checkpoint">000015</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000015</idno>
<idno type="wicri:doubleKey">1055-7148:2015:Mayzaud A:mitigation:of:topological</idno>
<idno type="wicri:source">HAL</idno>
<idno type="RBID">Hal:hal-01207843</idno>
<idno type="url">https://hal.inria.fr/hal-01207843</idno>
<idno type="wicri:Area/Hal/Corpus">003229</idno>
<idno type="wicri:Area/Hal/Curation">003229</idno>
<idno type="wicri:Area/Hal/Checkpoint">000452</idno>
<idno type="wicri:explorRef" wicri:stream="Hal" wicri:step="Checkpoint">000452</idno>
<idno type="wicri:doubleKey">1099-1190:2015:Mayzaud A:mitigation:of:topological</idno>
<idno type="wicri:Area/Main/Merge">000770</idno>
<idno type="wicri:Area/Main/Curation">000781</idno>
<idno type="wicri:Area/Main/Exploration">000781</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main">Mitigation of topological inconsistency attacks in RPL‐based low‐power lossy networks</title>
<author>
<name sortKey="Mayzaud, Anthea" sort="Mayzaud, Anthea" uniqKey="Mayzaud A" first="Anthéa" last="Mayzaud">Anthéa Mayzaud</name>
<affiliation wicri:level="4">
<country xml:lang="fr">France</country>
<wicri:regionArea>TELECOM Nancy, Université de Lorraine, INRIA Nancy‐Grand Est, LORIA UMR 7503, Villers‐lès‐Nancy</wicri:regionArea>
<orgName type="university">Université de Lorraine</orgName>
<placeName>
<settlement type="city">Nancy</settlement>
<settlement type="city">Metz</settlement>
<region type="region" nuts="2">Grand Est</region>
<region type="old region" nuts="2">Lorraine (région)</region>
</placeName>
</affiliation>
<affiliation wicri:level="4">
<country xml:lang="fr">France</country>
<wicri:regionArea>Correspondence to: Anthéa Mayzaud, TELECOM Nancy, Université de Lorraine, LORIA UMR 7503, INRIA Nancy‐Grand Est, Villers‐lès‐Nancy</wicri:regionArea>
<orgName type="university">Université de Lorraine</orgName>
<placeName>
<settlement type="city">Nancy</settlement>
<settlement type="city">Metz</settlement>
<region type="region" nuts="2">Grand Est</region>
<region type="old region" nuts="2">Lorraine (région)</region>
</placeName>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">France</country>
</affiliation>
</author>
<author>
<name sortKey="Sehgal, Anuj" sort="Sehgal, Anuj" uniqKey="Sehgal A" first="Anuj" last="Sehgal">Anuj Sehgal</name>
<affiliation wicri:level="3">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>Computer Science, Jacobs University Bremen, Bremen</wicri:regionArea>
<placeName>
<region type="land" nuts="3">Brême (Land)</region>
<settlement type="city">Brême</settlement>
</placeName>
</affiliation>
</author>
<author>
<name sortKey="Badonnel, Remi" sort="Badonnel, Remi" uniqKey="Badonnel R" first="Rémi" last="Badonnel">Rémi Badonnel</name>
<affiliation wicri:level="4">
<country xml:lang="fr">France</country>
<wicri:regionArea>TELECOM Nancy, Université de Lorraine, INRIA Nancy‐Grand Est, LORIA UMR 7503, Villers‐lès‐Nancy</wicri:regionArea>
<orgName type="university">Université de Lorraine</orgName>
<placeName>
<settlement type="city">Nancy</settlement>
<settlement type="city">Metz</settlement>
<region type="region" nuts="2">Grand Est</region>
<region type="old region" nuts="2">Lorraine (région)</region>
</placeName>
</affiliation>
</author>
<author>
<name sortKey="Chrisment, Isabelle" sort="Chrisment, Isabelle" uniqKey="Chrisment I" first="Isabelle" last="Chrisment">Isabelle Chrisment</name>
<affiliation wicri:level="4">
<country xml:lang="fr">France</country>
<wicri:regionArea>TELECOM Nancy, Université de Lorraine, INRIA Nancy‐Grand Est, LORIA UMR 7503, Villers‐lès‐Nancy</wicri:regionArea>
<orgName type="university">Université de Lorraine</orgName>
<placeName>
<settlement type="city">Nancy</settlement>
<settlement type="city">Metz</settlement>
<region type="region" nuts="2">Grand Est</region>
<region type="old region" nuts="2">Lorraine (région)</region>
</placeName>
</affiliation>
</author>
<author>
<name sortKey="Schonw Lder, Jurgen" sort="Schonw Lder, Jurgen" uniqKey="Schonw Lder J" first="Jürgen" last="Schönw Lder">Jürgen Schönw Lder</name>
<affiliation wicri:level="3">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>Computer Science, Jacobs University Bremen, Bremen</wicri:regionArea>
<placeName>
<region type="land" nuts="3">Brême (Land)</region>
<settlement type="city">Brême</settlement>
</placeName>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="j" type="main">International Journal of Network Management</title>
<title level="j" type="sub">Measure, Detect and Mitigate ‐ Challenges and Trends in Network Security</title>
<title level="j" type="alt">INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT</title>
<idno type="ISSN">1055-7148</idno>
<idno type="eISSN">1099-1190</idno>
<imprint>
<biblScope unit="vol">25</biblScope>
<biblScope unit="issue">5</biblScope>
<biblScope unit="page" from="320">320</biblScope>
<biblScope unit="page" to="339">339</biblScope>
<biblScope unit="page-count">20</biblScope>
<date type="published" when="2015-09">2015-09</date>
</imprint>
<idno type="ISSN">1055-7148</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">1055-7148</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract">The RPL is a routing protocol for low‐power and lossy networks. A malicious node can manipulate header options used by RPL to create topological inconsistencies, thereby causing denial of service attacks, reducing channel availability, increasing control message overhead, and increasing energy consumption at the targeted node and its neighborhood. RPL overcomes these topological inconsistencies via a fixed threshold, upon reaching which all subsequent packets with erroneous header options are ignored. However, this threshold value is arbitrarily chosen, and the performance can be improved by taking into account network characteristics. To address this, we present a mitigation strategy that allows nodes to dynamically adapt against a topological inconsistency attack based on the current network conditions. Results from our experiments show that our approach outperforms the fixed threshold and mitigates these attacks without significant overhead. Copyright © 2015 John Wiley & Sons, Ltd.</div>
<div type="abstract">A malicious node in an RPL network can manipulate header options to create topological inconsistencies. These can lead to denial of service attacks, reduced channel availability, increased overhead and higher energy consumption. We present a mitigation strategy that allows nodes to dynamically adjust and adapt against such topological inconsistency attacks based on current network conditions. Results from our experiments show that our mitigation approach outperforms RPL's built‐in mechanism for mitigating topological inconsistency attacks.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>Allemagne</li>
<li>France</li>
</country>
<region>
<li>Brême (Land)</li>
<li>Grand Est</li>
<li>Lorraine (région)</li>
</region>
<settlement>
<li>Brême</li>
<li>Metz</li>
<li>Nancy</li>
</settlement>
<orgName>
<li>Université de Lorraine</li>
</orgName>
</list>
<tree>
<country name="France">
<region name="Grand Est">
<name sortKey="Mayzaud, Anthea" sort="Mayzaud, Anthea" uniqKey="Mayzaud A" first="Anthéa" last="Mayzaud">Anthéa Mayzaud</name>
</region>
<name sortKey="Badonnel, Remi" sort="Badonnel, Remi" uniqKey="Badonnel R" first="Rémi" last="Badonnel">Rémi Badonnel</name>
<name sortKey="Chrisment, Isabelle" sort="Chrisment, Isabelle" uniqKey="Chrisment I" first="Isabelle" last="Chrisment">Isabelle Chrisment</name>
<name sortKey="Mayzaud, Anthea" sort="Mayzaud, Anthea" uniqKey="Mayzaud A" first="Anthéa" last="Mayzaud">Anthéa Mayzaud</name>
<name sortKey="Mayzaud, Anthea" sort="Mayzaud, Anthea" uniqKey="Mayzaud A" first="Anthéa" last="Mayzaud">Anthéa Mayzaud</name>
</country>
<country name="Allemagne">
<region name="Brême (Land)">
<name sortKey="Sehgal, Anuj" sort="Sehgal, Anuj" uniqKey="Sehgal A" first="Anuj" last="Sehgal">Anuj Sehgal</name>
</region>
<name sortKey="Schonw Lder, Jurgen" sort="Schonw Lder, Jurgen" uniqKey="Schonw Lder J" first="Jürgen" last="Schönw Lder">Jürgen Schönw Lder</name>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000781 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000781 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:A14407CFB9D429C8E5A536B45EA8663773ECC2BC
   |texte=   Mitigation of topological inconsistency attacks in RPL‐based low‐power lossy networks
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022