A Reference Implemenation for RPL Attacks Using Contiki-NG and COOJA

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

94 Downloads (Pure)

Abstract

RPL-based IoT networks are vulnerable to rout- ing attacks as well as flooding attacks. Developing security countermeasures requires knowledge of possible attacks, their timing, and combinations. Most implementations of RPL related attacks only consider individual attacks triggered when their simulation starts. Furthermore, nodes which to be compromised are preselected before a simulation starts and cannot later be changed. In this paper, we present a Contiki-NG implementation of most known RPL attacks all of which is shared on a public Github repository. In addition, we designed a framework in COOJA to facilitate simulating hybrid RPL attacks with different settings in terms of duration and severity.
Original languageEnglish
Title of host publication2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS)
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages7
ISBN (Electronic)978-1-6654-3929-9
ISBN (Print)978-1-6654-3930-5
DOIs
Publication statusPublished - 18 Nov 2021
Event3rd International Workshop on IoT Applications and Industry 4.0 -
Duration: 14 Jul 202116 Jul 2021

Publication series

Name
PublisherIEEE
ISSN (Print)2325-2936
ISSN (Electronic)2325-2944

Workshop

Workshop3rd International Workshop on IoT Applications and Industry 4.0
Abbreviated titleIoTI4 2021
Period14/07/2116/07/21

Keywords

  • Internet of things (IoT)
  • Contiki-NG
  • COOJA
  • RPL
  • Security

Fingerprint

Dive into the research topics of 'A Reference Implemenation for RPL Attacks Using Contiki-NG and COOJA'. Together they form a unique fingerprint.

Cite this