Journal article Open Access

The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks

Christopher Mitchel; Baraq Ghaleb; Safwan M. Ghaleb; Zakwan Jaroucheh; Bander Ali Saleh Al-rimy

Dublin Core Export

<?xml version='1.0' encoding='utf-8'?>
<oai_dc:dc xmlns:dc="" xmlns:oai_dc="" xmlns:xsi="" xsi:schemaLocation="">
  <dc:contributor>Blue Eyes Intelligence Engineering and Sciences Publication(BEIESP)</dc:contributor>
  <dc:creator>Christopher Mitchel</dc:creator>
  <dc:creator>Baraq Ghaleb</dc:creator>
  <dc:creator>Safwan M. Ghaleb</dc:creator>
  <dc:creator>Zakwan Jaroucheh</dc:creator>
  <dc:creator>Bander Ali Saleh  Al-rimy</dc:creator>
  <dc:description>With a predicted 50 billion devices by the end of 2020, the Internet of things has grown exponentially in the last few years. This growth has seen an increasing demand for mobility support in low power and lossy sensor networks, a type of network characterized by several limitations in terms of their resources including CPU, memory and batter, causing manufactures to push products out to the market faster, without the necessary security features. IoT networks rely on the Routing Protocol for Low Power and Lossy Network (RPL) for communication, designed by the Internet Engineering Task Force (IETF). This protocol has been proven to be efficient in relation to the handling of routing in such constrained networks, However, research studies revealed that RPL was inherently designed for static networks, indicating poor handling of mobile or dynamic topologies which is worsen when introducing mobile attacker. In this paper, two IoT routing attacks are evaluated under a mobile attacker with the aim of providing a critical evaluation of the impact the attacks have on the network in comparison to the case with static attacker. The first attack is the Rank attack in which the attacker announces false routing information to its neighbour attracting them to forward their data via the attacker. The second attack is the DIS attack in which the attacker floods the network with DIS messages triggering them to reset their transmission timers and sending messages more frequently. The comparison were conducted in terms of average power consumption and also the packet delivery ratio (PDR). Based on the results collected from the simulations, it was established that when an attacking node is mobile, there’s an average increase of 36.6 in power consumption and a decrease of 14 for packet delivery ratios when compared to a static attacking node.</dc:description>
  <dc:source>International Journal of Engineering and Advanced Technology (IJEAT) 10(2) 66-72</dc:source>
  <dc:subject>DIS attack, Internet-of-Things; IoT attacks, Mobile attacker, Rank attack.</dc:subject>
  <dc:subject>Retrieval Number</dc:subject>
  <dc:title>The Impact of Mobile DIS and  Rank-Decreased Attacks in Internet of Things  Networks</dc:title>
Views 18
Downloads 22
Data volume 14.0 MB
Unique views 18
Unique downloads 22


Cite as