Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion

The security landscape of Internet of Things (IoT) networks continues to draw significant attention from recent networks; the Version Number Attack (VNA) stands out as a prominent threat to IoT network resources. Routing Protocol for Low-Power and Lossy Network structures low-power and lossy network...

Full description

Bibliographic Details
Main Authors: Belkhira Hichem Sid Ahmed, Belkheir Mohammed, Rouissat Mehdi, Mokaddem Allel, Lorenz Pascal, Boukhobza Mohamed Achraf, Salmi Abdelhamid, Kouar Ahmed
Format: Article
Language:English
Published: De Gruyter 2024-01-01
Series:Open Information Science
Subjects:
Online Access:https://doi.org/10.1515/opis-2022-0165
_version_ 1797323424583909376
author Belkhira Hichem Sid Ahmed
Belkheir Mohammed
Rouissat Mehdi
Mokaddem Allel
Lorenz Pascal
Boukhobza Mohamed Achraf
Salmi Abdelhamid
Kouar Ahmed
author_facet Belkhira Hichem Sid Ahmed
Belkheir Mohammed
Rouissat Mehdi
Mokaddem Allel
Lorenz Pascal
Boukhobza Mohamed Achraf
Salmi Abdelhamid
Kouar Ahmed
author_sort Belkhira Hichem Sid Ahmed
collection DOAJ
description The security landscape of Internet of Things (IoT) networks continues to draw significant attention from recent networks; the Version Number Attack (VNA) stands out as a prominent threat to IoT network resources. Routing Protocol for Low-Power and Lossy Network structures low-power and lossy networks through one or more Destination Oriented Directed Acyclic Graphs (DODAGs). Each DODAG is assigned a version number, serving the purpose of ensuring the existence of loop-free paths to the root node. In the event of any inconsistency detected by the root node, the version number is incremented, triggering a global repair process and the reconstruction of the Directed Acyclic Graph. A potential security concern arises when a malicious node advertises a false version number in its control message, compelling the initiation of a global repair process. This study conducts a comprehensive analysis of the VNA’s impact, considering various parameters that have not been explored in previous research articles. These parameters include an examination of the additional forwarding tasks introduced by the attack and an exploration of factors contributing to node hyperactivity (such as loops, local and global repairs, etc.). The article delves into the specific control messages that result in the detrimental effects of the attack, offering a detailed analysis of control overhead, energy consumption, Packet Delivery Ratio, and latency. The obtained results show that the DAO (Destination Advertisement Object) messages dominate the total control overhead and are the main contributor to the total consumer energy, where the closest the malicious node to the sink the more damaging is the attack.
first_indexed 2024-03-08T05:28:28Z
format Article
id doaj.art-ec839516930a4195ae710886bc5637f2
institution Directory Open Access Journal
issn 2451-1781
language English
last_indexed 2024-03-08T05:28:28Z
publishDate 2024-01-01
publisher De Gruyter
record_format Article
series Open Information Science
spelling doaj.art-ec839516930a4195ae710886bc5637f22024-02-06T09:08:52ZengDe GruyterOpen Information Science2451-17812024-01-01811528153610.1515/opis-2022-0165Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific CriterionBelkhira Hichem Sid Ahmed0Belkheir Mohammed1Rouissat Mehdi2Mokaddem Allel3Lorenz Pascal4Boukhobza Mohamed Achraf5Salmi Abdelhamid6Kouar Ahmed7Department of Computer Science, Univeristy Center Nour Bachir, El-Bayadh, AlgeriaLIMA Laboratory, Univeristy Center Nour Bachir, El-Bayadh, AlgeriaDepartment of Computer Science, Univeristy Center Nour Bachir, El-Bayadh, AlgeriaLIMA Laboratory, Univeristy Center Nour Bachir, El-Bayadh, AlgeriaMIPS Laboratory, University of Haute Alsace, Mulhouse, FranceLIMA Laboratory, Univeristy Center Nour Bachir, El-Bayadh, AlgeriaDepartment of Computer Science, Univeristy Center Nour Bachir, El-Bayadh, AlgeriaDepartment of Computer Science, Univeristy Center Nour Bachir, El-Bayadh, AlgeriaThe security landscape of Internet of Things (IoT) networks continues to draw significant attention from recent networks; the Version Number Attack (VNA) stands out as a prominent threat to IoT network resources. Routing Protocol for Low-Power and Lossy Network structures low-power and lossy networks through one or more Destination Oriented Directed Acyclic Graphs (DODAGs). Each DODAG is assigned a version number, serving the purpose of ensuring the existence of loop-free paths to the root node. In the event of any inconsistency detected by the root node, the version number is incremented, triggering a global repair process and the reconstruction of the Directed Acyclic Graph. A potential security concern arises when a malicious node advertises a false version number in its control message, compelling the initiation of a global repair process. This study conducts a comprehensive analysis of the VNA’s impact, considering various parameters that have not been explored in previous research articles. These parameters include an examination of the additional forwarding tasks introduced by the attack and an exploration of factors contributing to node hyperactivity (such as loops, local and global repairs, etc.). The article delves into the specific control messages that result in the detrimental effects of the attack, offering a detailed analysis of control overhead, energy consumption, Packet Delivery Ratio, and latency. The obtained results show that the DAO (Destination Advertisement Object) messages dominate the total control overhead and are the main contributor to the total consumer energy, where the closest the malicious node to the sink the more damaging is the attack.https://doi.org/10.1515/opis-2022-0165rpliotsecurityvnaattack
spellingShingle Belkhira Hichem Sid Ahmed
Belkheir Mohammed
Rouissat Mehdi
Mokaddem Allel
Lorenz Pascal
Boukhobza Mohamed Achraf
Salmi Abdelhamid
Kouar Ahmed
Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion
Open Information Science
rpl
iot
security
vna
attack
title Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion
title_full Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion
title_fullStr Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion
title_full_unstemmed Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion
title_short Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion
title_sort comprehensive examination of version number attacks in iot networks nodes hyperactivity as specific criterion
topic rpl
iot
security
vna
attack
url https://doi.org/10.1515/opis-2022-0165
work_keys_str_mv AT belkhirahichemsidahmed comprehensiveexaminationofversionnumberattacksiniotnetworksnodeshyperactivityasspecificcriterion
AT belkheirmohammed comprehensiveexaminationofversionnumberattacksiniotnetworksnodeshyperactivityasspecificcriterion
AT rouissatmehdi comprehensiveexaminationofversionnumberattacksiniotnetworksnodeshyperactivityasspecificcriterion
AT mokaddemallel comprehensiveexaminationofversionnumberattacksiniotnetworksnodeshyperactivityasspecificcriterion
AT lorenzpascal comprehensiveexaminationofversionnumberattacksiniotnetworksnodeshyperactivityasspecificcriterion
AT boukhobzamohamedachraf comprehensiveexaminationofversionnumberattacksiniotnetworksnodeshyperactivityasspecificcriterion
AT salmiabdelhamid comprehensiveexaminationofversionnumberattacksiniotnetworksnodeshyperactivityasspecificcriterion
AT kouarahmed comprehensiveexaminationofversionnumberattacksiniotnetworksnodeshyperactivityasspecificcriterion