hh.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks
School of Engineering and Information Sciences, Middlesex University, London, United Kingdom.
School of Engineering and Information Sciences, Middlesex University, London, United Kingdom.
School of Engineering and Information Sciences, Middlesex University, London, United Kingdom.
Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES). Tampere University of Technology, Tampere, Finland.ORCID iD: 0000-0003-4894-4134
Show others and affiliations
2013 (English)In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 13, no 10, p. 3685-3692Article in journal (Refereed) Published
Abstract [en]

Routing protocol for low power and lossy networks (RPL) is the underlying routing protocol of 6LoWPAN, a core communication standard for the Internet of Things. RPL outperforms other wireless sensor and ad hoc routing protocols in quality of service (QoS), device management, and energy saving performance. The Rank concept in RPL serves multiple purposes, including route optimization, prevention of loops, and managing control overhead. In this paper, we analyze several different types of internal threats that are aimed at the Rank property and study their impact on the performance of the wireless sensor network. Our analysis raises the question of an RPL weakness, which is the lack of a monitoring parent in every node. In RPL, the child node only receives the parent information through control messages, but it cannot check the services that its parent provide hence it will follow a bad quality route if it has a malicious parent. Our results show that different types of the Rank attacks can be used to intentionally downgrade specific QoS parameters. This paper also reveals that attack in a high forwarding load area will have more impact on network performance than attack in other areas. The defenders can use the knowledge of such correlation between attack location and its impact to set higher security levels at particular positions by monitoring sensitive network parameters and detecting the anomalies © 2001-2012 IEEE.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE Press, 2013. Vol. 13, no 10, p. 3685-3692
Keywords [en]
internal threat, performance, Rank attack, RPL, security
National Category
Communication Systems Telecommunications
Identifiers
URN: urn:nbn:se:hh:diva-24268DOI: 10.1109/JSEN.2013.2266399ISI: 000324337900003Scopus ID: 2-s2.0-84883406171OAI: oai:DiVA.org:hh-24268DiVA, id: diva2:683103
Note

Article number 6525333

Available from: 2014-01-02 Created: 2014-01-02 Last updated: 2017-12-06Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Vinel, Alexey

Search in DiVA

By author/editor
Vinel, Alexey
By organisation
Centre for Research on Embedded Systems (CERES)
In the same journal
IEEE Sensors Journal
Communication SystemsTelecommunications

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 342 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf