Title
A Study of RPL DODAG Version Attacks.
Abstract
The IETF designed the Routing Protocol for Low power and Lossy Networks (RPL) as a candidate for use in constrained networks. Keeping in mind the different requirements of such networks, the protocol was designed to support multiple routing topologies, called DODAGs, constructed using different objective functions, so as to optimize routing based on divergent metrics. A DODAG versioning system is incorporated into RPL in order to ensure that the topology does not become stale and that loops are not formed over time. However, an attacker can exploit this versioning system to gain an advantage in the topology and also acquire children that would be forced to route packets via this node. In this paper we present a study of possible attacks that exploit the DODAG version system. The impact on overhead, delivery ratio, end-to-end delay, rank inconsistencies and loops is studied.
Year
DOI
Venue
2014
10.1007/978-3-662-43862-6_12
Lecture Notes in Computer Science
Field
DocType
Volume
Lossy compression,Computer science,Network packet,Computer network,Network topology,Exploit,Routing protocol,Distributed computing,Software versioning
Conference
8508
ISSN
Citations 
PageRank 
0302-9743
11
0.65
References 
Authors
9
5
Name
Order
Citations
PageRank
Anthéa Mayzaud1654.16
Anuj Sehgal2546.06
Remi Badonnel315422.43
Isabelle Chrisment422525.75
Jürgen Schönwälder536552.17