• Türkçe
    • English
  • English 
    • Türkçe
    • English
  • Login
View Item 
  •   DSpace@Muğla
  • Fakülteler
  • Mühendislik Fakültesi
  • Yazılım Mühendisliği Bölümü Koleksiyonu
  • View Item
  •   DSpace@Muğla
  • Fakülteler
  • Mühendislik Fakültesi
  • Yazılım Mühendisliği Bölümü Koleksiyonu
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Analysis of RPL Objective Functions with Security Perspective

Date

2021

Author

Doğan, Cansu
Yılmaz, Selim
Şen, Sevil

Metadata

Show full item record

Citation

Dogan, C.; Yilmaz, S. and Sen, S. (2022). Analysis of RPL Objective Functions with Security Perspective. In Proceedings of the 11th International Conference on Sensor Networks - SENSORNETS, ISBN 978-989-758-551-7; ISSN 2184-4380, pages 71-80. DOI: 10.5220/0011011900003118

Abstract

The IPv6 Routing Protocol for Low Power Lossy Networks (RPL) is one of the standardized routing protocols for lossy networks consisting of resource-constrained Internet of Things (IoT) devices. RPL allows to use different objective functions based on different routing metrics such as expected transmission count (ETX), hop count, and energy to determine effective routes. In the literature, the performance of two objective functions namely Objective Function Zero (OF0), Minimum Rank with Hysteresis Objective Function (MRHOF) are evaluated thoroughly, since they are accepted as standard objective functions in RPL. However their performance under attack has not been evaluated comprehensively yet. Although RPL has defined some specifications for its security, it is still vulnerable to insider attacks, which could dramatically affect the network performance. Therefore, this study investigates how the performance of objective functions are affected by RPL specific attacks. Version number, DIS flooding, and worst parent attacks are analyzed by using the following performance metrics: packet delivery ratio, overhead, latency, and power consumption. Moreover, how they are affected by the number of attackers in the network are analyzed. To the best of the authors' knowledge, this is the first study that comprehensively explores RPL objective functions on networks under attacks.

Source

11th International Conference on Sensor Networks (SENSORNETS)

URI

https://hdl.handle.net/20.500.12809/10084

Collections

  • WoS İndeksli Yayınlar Koleksiyonu [6466]
  • Yazılım Mühendisliği Bölümü Koleksiyonu [11]



DSpace software copyright © 2002-2015  DuraSpace
Contact Us | Send Feedback
Theme by 
@mire NV
 

 




| Policy | Guide | Contact |

DSpace@Muğla

by OpenAIRE
Advanced Search

sherpa/romeo

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsTypeLanguageDepartmentCategoryPublisherAccess TypeInstitution AuthorThis CollectionBy Issue DateAuthorsTitlesSubjectsTypeLanguageDepartmentCategoryPublisherAccess TypeInstitution Author

My Account

LoginRegister

DSpace software copyright © 2002-2015  DuraSpace
Contact Us | Send Feedback
Theme by 
@mire NV
 

 


|| Policy || Guide|| Instruction || Library || Muğla Sıtkı Koçman University || OAI-PMH ||

Muğla Sıtkı Koçman University, Muğla, Turkey
If you find any errors in content, please contact:

Creative Commons License
Muğla Sıtkı Koçman University Institutional Repository is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 4.0 Unported License..

DSpace@Muğla:


DSpace 6.2

tarafından İdeal DSpace hizmetleri çerçevesinde özelleştirilerek kurulmuştur.