A Study of RPL DODAG Version Attacks

Anthéa Mayzaud 1 Anuj Sehgal 2 Rémi Badonnel 3 Isabelle Chrisment 1 Jürgen Schönwälder 2
1 MADYNES - Management of dynamic networks and services
Inria Nancy - Grand Est, LORIA - NSS - Department of Networks, Systems and Services
3 MADYNES - Management of dynamic networks and services
INRIA Lorraine, LORIA - Laboratoire Lorrain de Recherche en Informatique et ses Applications
Abstract : The IETF designed the Routing Protocol for Low power and Lossy Networks (RPL) as a candidate for use in constrained networks. Keeping in mind the different requirements of such networks, the protocol was designed to support multiple routing topologies, called DODAGs, constructed using different objective functions, so as to optimize routing based on divergent metrics. A DODAG versioning system is incorporated into RPL in order to ensure that the topology does not become stale and that loops are not formed over time. However, an attacker can exploit this versioning system to gain an advantage in the topology and also acquire children that would be forced to route packets via this node. In this paper we present a study of possible attacks that exploit the DODAG version system. The impact on overhead, delivery ratio, end-to-end delay, rank inconsistencies and loops is studied.
Type de document :
Communication dans un congrès
Anna Sperotto; Guillaume Doyen; Steven Latré; Marinos Charalambides; Burkhard Stiller. 8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. Lecture Notes in Computer Science, LNCS-8508, pp.92-104, 2014, Monitoring and Securing Virtualized Networks and Services. 〈10.1007/978-3-662-43862-6_12〉
Liste complète des métadonnées

Littérature citée [16 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01090993
Contributeur : Anthéa Mayzaud <>
Soumis le : jeudi 4 décembre 2014 - 14:35:52
Dernière modification le : jeudi 11 janvier 2018 - 06:25:23
Document(s) archivé(s) le : samedi 15 avril 2017 - 04:04:42

Fichier

mayzaud_aims2014.pdf
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Anthéa Mayzaud, Anuj Sehgal, Rémi Badonnel, Isabelle Chrisment, Jürgen Schönwälder. A Study of RPL DODAG Version Attacks. Anna Sperotto; Guillaume Doyen; Steven Latré; Marinos Charalambides; Burkhard Stiller. 8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. Lecture Notes in Computer Science, LNCS-8508, pp.92-104, 2014, Monitoring and Securing Virtualized Networks and Services. 〈10.1007/978-3-662-43862-6_12〉. 〈hal-01090993〉

Partager

Métriques

Consultations de la notice

553

Téléchargements de fichiers

1239