作者
Faiza Medjek, Djamel Tandjaoui, Imed Romdhani, Nabil Djedjig
发表日期
2017/8/1
研讨会论文
2017 IEEE Trustcom/BigDataSE/ICESS
页码范围
1049-1055
出版商
IEEE
简介
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for Internet of Things (IoT) applications. In this paper we implemented and evaluated the performance of RPL (Routing Protocol for Low-Power and Lossy Networks) routing protocol under mobile sybil attacks, namely SybM, with respect to control overhead, packet delivery and energy consumption. In SybM attacks, Sybil nodes take the advantage of their mobility and the weakness of RPL to handle identity and mobility, to flood the network with fake control messages from different locations. To counter these type of attacks we propose a trust-based intrusion detection system based on RPL.
引用总数
201820192020202120222023128864
学术搜索中的文章
F Medjek, D Tandjaoui, I Romdhani, N Djedjig - 2017 IEEE Trustcom/BigDataSE/ICESS, 2017