@inproceedings{66ea24c779a44bb2926aebe47c791f20,
title = "A Reference Implemenation for RPL Attacks Using Contiki-NG and COOJA",
abstract = "RPL-based IoT networks are vulnerable to rout- ing attacks as well as flooding attacks. Developing security countermeasures requires knowledge of possible attacks, their timing, and combinations. Most implementations of RPL related attacks only consider individual attacks triggered when their simulation starts. Furthermore, nodes which to be compromised are preselected before a simulation starts and cannot later be changed. In this paper, we present a Contiki-NG implementation of most known RPL attacks all of which is shared on a public Github repository. In addition, we designed a framework in COOJA to facilitate simulating hybrid RPL attacks with different settings in terms of duration and severity.",
keywords = "Internet of things (IoT), Contiki-NG, COOJA, RPL, Security",
author = "Faya Algahtani and Theo Tryfonas and George Oikonomou",
year = "2021",
month = nov,
day = "18",
doi = "10.1109/DCOSS52077.2021.00053",
language = "English",
isbn = "978-1-6654-3930-5",
publisher = "Institute of Electrical and Electronics Engineers (IEEE)",
booktitle = "2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS)",
address = "United States",
note = "3rd International Workshop on IoT Applications and Industry 4.0, IoTI4 2021 ; Conference date: 14-07-2021 Through 16-07-2021",
}