dc.contributor.author | Doğan, Cansu | |
dc.contributor.author | Yılmaz, Selim | |
dc.contributor.author | Şen, Sevil | |
dc.date.accessioned | 2022-07-07T12:53:57Z | |
dc.date.available | 2022-07-07T12:53:57Z | |
dc.date.issued | 2021 | en_US |
dc.identifier.citation | Dogan, C.; Yilmaz, S. and Sen, S. (2022). Analysis of RPL Objective Functions with Security Perspective. In Proceedings of the 11th International Conference on Sensor Networks - SENSORNETS, ISBN 978-989-758-551-7; ISSN 2184-4380, pages 71-80. DOI: 10.5220/0011011900003118 | en_US |
dc.identifier.uri | https://hdl.handle.net/20.500.12809/10084 | |
dc.description.abstract | The IPv6 Routing Protocol for Low Power Lossy Networks (RPL) is one of the standardized routing protocols for lossy networks consisting of resource-constrained Internet of Things (IoT) devices. RPL allows to use different objective functions based on different routing metrics such as expected transmission count (ETX), hop count, and energy to determine effective routes. In the literature, the performance of two objective functions namely Objective Function Zero (OF0), Minimum Rank with Hysteresis Objective Function (MRHOF) are evaluated thoroughly, since they are accepted as standard objective functions in RPL. However their performance under attack has not been evaluated comprehensively yet. Although RPL has defined some specifications for its security, it is still vulnerable to insider attacks, which could dramatically affect the network performance. Therefore, this study investigates how the performance of objective functions are affected by RPL specific attacks. Version number, DIS flooding, and worst parent attacks are analyzed by using the following performance metrics: packet delivery ratio, overhead, latency, and power consumption. Moreover, how they are affected by the number of attackers in the network are analyzed. To the best of the authors' knowledge, this is the first study that comprehensively explores RPL objective functions on networks under attacks. | en_US |
dc.item-language.iso | eng | en_US |
dc.publisher | SCITEPRESS | en_US |
dc.relation.isversionof | 10.5220/0011011900003118 | en_US |
dc.item-rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Internet of Things | en_US |
dc.subject | Routing Protocol | en_US |
dc.subject | RPL | en_US |
dc.subject | Objective Functions | en_US |
dc.subject | RPL Security | en_US |
dc.subject | RPL Attacks | en_US |
dc.title | Analysis of RPL Objective Functions with Security Perspective | en_US |
dc.item-type | conferenceObject | en_US |
dc.contributor.department | MÜ, Mühendislik Fakültesi, Yazılım Mühendisliği Bölümü | en_US |
dc.contributor.institutionauthor | Yılmaz, Selim | |
dc.identifier.startpage | 71 | en_US |
dc.identifier.endpage | 80 | en_US |
dc.relation.journal | 11th International Conference on Sensor Networks (SENSORNETS) | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |