A Reference Implemenation for RPL Attacks Using Contiki-NG and COOJA

Research output: Contribution to conferenceConference Paperpeer-review

24 Downloads (Pure)

Abstract

RPL-based IoT networks are vulnerable to rout- ing attacks as well as flooding attacks. Developing security countermeasures requires knowledge of possible attacks, their timing, and combinations. Most implementations of RPL related attacks only consider individual attacks triggered when their simulation starts. Furthermore, nodes which to be compromised are preselected before a simulation starts and cannot later be changed. In this paper, we present a Contiki-NG implementation of most known RPL attacks all of which is shared on a public Github repository. In addition, we designed a framework in COOJA to facilitate simulating hybrid RPL attacks with different settings in terms of duration and severity.
Original languageEnglish
Number of pages7
Publication statusPublished - 16 Jul 2021
Event3rd International Workshop on IoT Applications and Industry 4.0 -
Duration: 14 Jul 202116 Jul 2021

Workshop

Workshop3rd International Workshop on IoT Applications and Industry 4.0
Abbreviated titleIoTI4 2021
Period14/07/2116/07/21

Keywords

  • Internet of things (IoT)
  • Contiki-NG
  • COOJA
  • RPL
  • Security

Fingerprint

Dive into the research topics of 'A Reference Implemenation for RPL Attacks Using Contiki-NG and COOJA'. Together they form a unique fingerprint.

Cite this