首页> 外文会议>IEEE International Conference on Cyber Security and Cloud Computing >Hatchetman Attack: A Denial of Service Attack Against Routing in Low Power and Lossy Networks
【24h】

Hatchetman Attack: A Denial of Service Attack Against Routing in Low Power and Lossy Networks

机译:Hatchetman攻击:拒绝低功耗和有损网络路由的服务攻击

获取原文

摘要

Low power and lossy networks (LLNs) are rapidly burgeoning as an important part of ubiquitous communication infrastructure, and serving as a major building block for emerging Internet-of-Things (IoT) applications. A novel routing protocol for low power and lossy networks, referred to as RPL, has been standardized to provide efficient and reliable communication in LLNs, and enable the integration of resources-constrained devices into the Internet. However, due to the lack of resources, physical protection, and security requirements of inherent routing protocol, RPL-based LLNs are admittedly vulnerable to Denial-of-Service (DoS) attacks that primarily disrupt network protocols and interfere with on-going communications. In this paper, we investigate a new type of DoS attack, called hatchetman attack, in promptly emerging RPL-based LLNs. In hatchetman attack, the malicious node manipulates the source route header of the received packets, and then generates and sends a large number of invalid packets with error route to legitimate nodes, which cause the legitimate nodes to drop the received packets and reply an excessive number of Error messages back to the DODAG root. As a result, a great number of packets are dropped by legitimate nodes and excessive Error messages exhaust the communication bandwidth and node energy, which lead to a denial of service in RPL-based LLNs. We conduct extensive simulation experiments for performance evaluation of hatchetman attack and comparison with jamming attack and original RPL without adversary. The simulation results indicate that the hatchetman attack is an extremely severe attack in RPL-based LLNs.
机译:低功耗和有损网络(LLNS)迅速蓬勃发展,作为无处不在的通信基础设施的重要组成部分,并作为新兴内容的主要建筑块(IOT)应用程序。用于低功耗和有损网络的新颖路由协议,称为RPL,已被标准化,以提供LLN中的有效可靠的通信,并使资源受限设备集成到Internet中。但是,由于缺乏资源,物理保护和固有路由协议的安全要求,基于RPL的LLNS易于易受拒绝服务(DOS)攻击,主要扰乱网络协议并干扰正在进行的通信。在本文中,我们调查了一种新型的DOS攻击,称为Hatchetman攻击,在迅速新兴的基于RPL的LLNS中。在Hatchetman攻击中,恶意节点会操纵所接收的数据包的源路径标题,然后生成并发送具有错误路由的大量无效数据包到合法节点,这导致合法节点放弃接收的数据包并回复过多的数据包并回复过多错误消息返回DoDAG Root。结果,由合法节点丢弃了大量的数据包,并且过多的错误消息排出通信带宽和节点能量,这导致基于RPL的LLN中的拒绝服务。我们对柴刀攻击的绩效评估进行了广泛的仿真实验,并与干扰攻击和原始rpl的比较而没有对手。仿真结果表明,柴刀攻击是基于RPL的LLNS的极其严重的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号