The Internet of Things (IoT) is becoming ubiquitous in our daily life. IoT networks that are made up of devices low power, low memory, and low computing capability appears in many applications such as healthcare, home, agriculture. IPv6 Routing Protocol for Low Power and Lossy Network (RPL) has become a standardized routing protocol for such low-power and lossy networks in IoT. RPL establishes the best routes between devices according to the requirements of the application, which is achieved by the Objective Function (OF). Even though some security mechanisms are defined for external attackers in its RFC, RPL is vulnerable to attacks coming from inside. Moreover, the same attacks could has different impacts on networks with different OFs. Therefore, an analysis of such attacks becomes important in order to develop suitable security solutions for RPL. This study analyze RPL-specific attacks on networks using RPL's default OFs, namely Objective Function Zero (OF0) and the Minimum Rank with Hysteresis Objective Function (MRHOF). Moreover, mobile attackers could affect more nodes in a network due to their mobility. While the security solutions proposed in the literature assume that the network is static, this study takes into account mobile attackers.
翻译:物联网(IoT)正在成为我们日常生活中无所不在的存在。由低功率、低内存和低计算能力设备组成的IoT网络出现在许多应用中,如医疗保健、家庭和农业。IPv6低功耗和有损网络路由协议(RPL)已成为此类低功率和有损网络的标准路由协议。RPL根据应用程序的需求在设备之间建立最佳路由,这是通过目标函数(OF)实现的。尽管它的RFC定义了一些针对外部攻击者的安全机制,但RPL易受来自内部的攻击。此外,相同的攻击在具有不同OF的网络中可能具有不同的影响。因此,对此类攻击的分析变得重要,以开发适合于RPL的安全解决方案。本研究分析了在使用RPL的默认OF,即OF0和Minimum Rank with Hysteresis Objective Function(MRHOF)的网络上的RPL特定攻击。此外,在移动攻击者的影响下,由于其移动性,他们可能会影响网络中的更多节点。虽然文献中提出的安全解决方案假定网络是静态的,但本研究考虑了移动攻击者的影响。