Analysis of Different Routing Attacks Against WSN's Using RPL with Contiki OS and Cooja Simulator
Cruz, J. (2017). Analysis of Different Routing Attacks Against WSN's Using RPL with Contiki OS and Cooja Simulator (BEng (Hons) CSF Dissertation). Edinburgh Napier University (Ekonomou, E.,
It is predicted that Internet of things (IoT) devices will reach enormous significance in a near future. IoT devices are usually limited in hardware, CPU processing and are power constrained. Since those devices need to be interconnected, there should be protocols capable of routing packets among nodes. Moreover, these protocols must meet enough security requirements to avoid compromising routing processes, resources and data contents.
Through this document is presented an extensive overview about RPL as a routing protocol for low-power and lossy networks, as well as its security challenges. This document is focused on demonstrating the power consumption impact that nodes might experience when some well-known attacks take place against WSN using RPL. It is desired to demonstrate, through attack simulations using Cooja simulator, the strong correlation between those attacks and the nodes power consumption. Furthermore, the document will present and discuss possible solutions to counter these attacks.