RPL-based IoT networks are vulnerable to rout- ing attacks as well as flooding attacks. Developing security countermeasures requires knowledge of possible attacks, their timing, and combinations. Most implementations of RPL related attacks only consider individual attacks triggered when their simulation starts. Furthermore, nodes which to be compromised are preselected before a simulation starts and cannot later be changed. In this paper, we present a Contiki-NG implementation of most known RPL attacks all of which is shared on a public Github repository. In addition, we designed a framework in COOJA to facilitate simulating hybrid RPL attacks with different settings in terms of duration and severity.
|Workshop||3rd International Workshop on IoT Applications and Industry 4.0|
|Abbreviated title||IoTI4 2021|
|Period||14/07/21 → 16/07/21|
- Internet of things (IoT)