Performance Evaluation of Mobile RPL-Based IoT Networks under Hello Flood Attack
Abstract
:1. Introduction
2. Contributions
3. Background
3.1. RPL Overview
3.2. Hello Food Attack
3.3. Overview of Mobility Models
4. Related Works
5. Methodology and Setups
5.1. Simulation Setups
5.2. Simulation Environment
5.3. Performances Metrics
5.4. Simulation Scenarios
6. Performances Analysis
6.1. The Column Mobility Model (CMM)
6.1.1. Packet Delivery Ratio
6.1.2. End-to-End Delay
6.1.3. Throughput
6.1.4. Expected Transmission Count
6.1.5. Average Power Consumption
6.2. The Reference Point Group Mobility (RPGM)
6.2.1. Packet Delivery Ratio
6.2.2. End-to-End Delay
6.2.3. Throughput
6.2.4. Expected Transmission Count
6.2.5. Average Power Consumption
6.3. The Nomadic Mobility Model (NCM)
6.3.1. Packet Delivery Ratio
6.3.2. End-to-End Delay
6.3.3. Throughput
6.3.4. Expected Transmission Count
6.3.5. Average Power Consumption
6.4. The Pursue Mobility Model (PMM)
6.4.1. Packet Delivery Ratio
6.4.2. End-to-End Delay
6.4.3. Throughput
6.4.4. Expected Transmission Count
6.4.5. Average Power Consumption
7. Discussion
8. Conclusions
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Correction Statement
References
- Murthy, M.Y.B.; Koteswararao, A. Applications, merits and demerits of WSN with IoT: A detailed review. Int. J. Auton. Adapt. Commun. Syst. 2024, 17, 68–88. [Google Scholar] [CrossRef]
- Vyas, D.; Patel, R. A Survey: Specific Aspect of the RPL Protocol and its Enhancements. Int. J. Intell. Syst. Appl. Eng. 2024, 12, 294–308. [Google Scholar]
- Hkiri, A.; Karmani, M.; Bahri, O.B.; Murayr, A.M.; Alasmari, F.H.; Machhout, M. RPL-Based IoT Networks under Decreased Rank Attack: Performance Analysis in Static and Mobile Environments. Comput. Mater. Contin. 2024, 78, 227–247. [Google Scholar] [CrossRef]
- Hussain, S.J.; Roopa, M. Evaluating the Impact of RPL Control Overhead on Network Performance. In Proceedings of the 2nd International Conference on Edge Computing and Applications (ICECAA), Namakkal, India, 19–21 July 2023; pp. 117–121. [Google Scholar]
- Hkiri, A.; Karmani, M.; Machhout, M. The routing protocol for low power and lossy networks (RPL) under attack: Simulation and analysis. In Proceedings of the 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET), Hammamet, Tunisia, 22–25 March 2022; pp. 143–148. [Google Scholar]
- Rouissat, M.; Belkheir, M.; Alsukayti, I.S.; Mokaddem, A. A lightweight mitigation approach against a new inundation attack in RPL-based IoT networks. Appl. Sci. 2023, 13, 10366. [Google Scholar] [CrossRef]
- Safaei, B.; Mohammadsalehi, A.; Khoosani, K.T.; Zarbaf, S.; Monazzah, A.M.H.; Samie, F.; Bauer, L.; Henkel, J.; Ejlali, A. Impacts of mobility models on RPL-based mobile IoT infrastructures: An evaluative comparison and survey. IEEE Access 2020, 8, 167779–167829. [Google Scholar] [CrossRef]
- Shetty, S.P.; Shenoy, U.K.K. Performance of RPL under various mobility models in IoT. Int. J. Auton. Adapt. Commun. Syst. 2023, 16, 248–269. [Google Scholar] [CrossRef]
- Tu, J.; Li, Q.; Wang, Y. T-Sorokin: A General Mobility Model in Opportunistic Networks. In Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Rio de Janeiro, Brazil, 24–26 May 2023; pp. 885–890. [Google Scholar]
- Alves, A.E.S.; Pires, L.M.R.; Gonçalves, L.C. Development and analysis of new implementations of MAC protocols and mobility models in LoRa networks. Braz. J. Dev. 2023, 9, 9188–9205. [Google Scholar] [CrossRef]
- Mangla, K.; Kumar, R.; Bhargava, V. Analysis of Flooding Attacks on Wireless Sensor Network. Int. J. Latest Technol. Eng. Manag. Appl. Sci. (IJLTEMAS) 2014, 3, 2278–2540. [Google Scholar]
- Lakshmi, H.N.; Anand, S.; Sinha, S. Flooding attack in wireless sensor network-analysis and prevention. Int. J. Eng. Adv. Technol. 2019, 8, 1792–1796. [Google Scholar]
- Banga, S.; Arora, H.; Sankhla, S.; Sharma, G.; Jain, B. Performance analysis of hello flood attack in WSN. In Proceedings of the International Conference on Communication and Computational Technologies (ICCCT), Singapore, 30–31 August 2019; Springer: Singapore, 2020; pp. 335–342. [Google Scholar]
- Magotra, S.; Gondhi, N.K. Impact of HELLO flood attack on Hierarchical Routing Protocols in WSN. Res. Cell Int. J. Eng. Sci. 2018, 27, 1–6. [Google Scholar]
- Maurya, P.; Kushwaha, V. Impact Analysis of Hello Flood Attack on RPL. In Proceedings of the International Conference on Advanced Network Technologies and Intelligent Computing, Varanasi, India, 22–24 December 2022; Springer Nature: Cham, Switzerland, 2022; pp. 554–568. [Google Scholar]
- Belkhira, H.S.A.; Belkheir, M.; Rouissat, M.; Mokaddem, A.; Lorenz, P.; Boukhobza, M.A.; Salmi, A.; Kouar, A. Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion. Open Inf. Sci. 2024, 8, 20220165. [Google Scholar] [CrossRef]
- Bothe, A.; Aschenbruck, N. BonnMotion 4-taking mobility generation to the next level. In Proceedings of the 39th International Performance Computing and Communications Conference (IPCCC), Austin, TX, USA, 6–8 November 2020; pp. 1–8. [Google Scholar]
- Elappila, M.; Chinara, S. Implementation of survivability aware protocols in WSN for IoT applications using Contiki-OS and hardware testbed evaluation. Microprocess. Microsyst. 2024, 104, 104988. [Google Scholar] [CrossRef]
- Farea, A.; Küçük, K. Machine Learning-based Intrusion Detection Technique for IoT: Simulation with Cooja. Int. J. Comput. Netw. Inf. Secur. 2024, 16, 1–23. [Google Scholar] [CrossRef]
- Vishwas, S.; Hareesh, K. An Energy Efficient Cloud-Based Routing Protocol for Wireless Sensor Network (WSN) for Improving Throughput and Packet Delivery Ratio. Int. J. Intell. Syst. Appl. Eng. 2024, 12, 697–710. [Google Scholar]
Settings | Values |
---|---|
Transmission range | 50 m |
Dimension area | 100 m × 100 m |
Sensor nodes’ number | 10, 20, 30, 40, 50, 60 |
Attacker nodes’ number | 10%, 20%, 30%, 40% |
Radio medium | Unit disk graph medium |
Transport layer protocol | UDP |
PHY and MAC layer | IEEE 802.15.4 |
Data packet sending interval | 1 to 2 m/s |
Mobility models | CMM, RPGM, NCM, PMM |
Metric | CMM (No Attack) | CMM (With Attack) | RPGM (No Attack) | RPGM (With Attack) | NCM (No Attack) | NCM (With Attack) | PMM (No Attack) | PMM (With Attack) |
---|---|---|---|---|---|---|---|---|
Packet Delivery Ratio (PDR) | Strong: Efficient data delivery Weak: Increased E2ED, ETX | Weak: Vulnerable to disruptions Strong: Balanced realism | Moderate: Balanced realism Moderate: Vulnerable to attacks | Moderate: Balanced realism Moderate: Increased E2ED, ETX | Moderate: Reflects migratory behavior Weak: Limited scalability | Weak: Increased packet loss, delays Weak: Increased E2ED, ETX | Strong: Suitable for tracking moving targets Weak: Limited applicability | Weak: Limited applicability Weak: Increased overhead |
End-to-End Delay (E2ED) | Weak: Increased E2ED, ETX Strong: Efficient data delivery | Weak: Increased E2ED, ETX Weak: Increased packet loss | Moderate: Balanced realism Moderate: Balanced realism | Weak: Increased E2ED, ETX Weak: Increased packet loss | Weak: Limited scalability Weak: Increased packet loss | Weak: Increased packet loss, delays Weak: Increased E2ED, ETX | Weak: Limited applicability Strong: Suitable for tracking moving targets | Weak: Increased overhead Weak: Limited applicability |
Throughput | Strong: Efficient data transmission Weak: Increased E2ED | Weak: Congestion, reduced data transfer Weak: Increased APC | Moderate: Balanced performance Moderate: Congestion, reduced data transfer | Weak: Congestion, reduced data transfer Weak: Increased APC | Moderate: Efficient data transmission Weak: Limited scalability | Weak: Congestion, reduced data transfer Weak: Increased APC | Strong: Efficient tracking of moving targets Weak: Limited applicability | Weak: Limited applicability Weak: Increased overhead |
Expected Transmission Count (ETX) | Weak: Increased E2ED, ETX Strong: Efficient data delivery | Weak: Increased E2ED, ETX Weak: Increased packet loss | Moderate: Balanced realism Moderate: Balanced performance | Weak: Increased E2ED, ETX Weak: Increased packet loss | Moderate: Reflects migratory behavior Weak: Limited scalability | Weak: Increased packet loss, delays Weak: Increased E2ED, ETX | Strong: Suitable for tracking moving targets Weak: Limited applicability | Weak: Limited applicability Weak: Increased overhead |
Average Power Consumption (APC) | Strong: Efficient energy utilization Weak: Increased APC | Weak: Increased energy consumption Weak: Increased energy consumption | Moderate: Balanced energy consumption Moderate: Increased APC | Weak: Increased APC | Weak: Increased energy consumption Weak: Limited scalability | Weak: Increased APC | Strong: Efficient energy utilization Weak: Limited applicability | Weak: Limited applicability Weak: Increased APC |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hkiri, A.; Alqurashi, S.; Ben Bahri, O.; Karmani, M.; Faraj, H.; Machhout, M. Performance Evaluation of Mobile RPL-Based IoT Networks under Hello Flood Attack. Electronics 2024, 13, 2226. https://doi.org/10.3390/electronics13112226
Hkiri A, Alqurashi S, Ben Bahri O, Karmani M, Faraj H, Machhout M. Performance Evaluation of Mobile RPL-Based IoT Networks under Hello Flood Attack. Electronics. 2024; 13(11):2226. https://doi.org/10.3390/electronics13112226
Chicago/Turabian StyleHkiri, Amal, Sami Alqurashi, Omar Ben Bahri, Mouna Karmani, Hamzah Faraj, and Mohsen Machhout. 2024. "Performance Evaluation of Mobile RPL-Based IoT Networks under Hello Flood Attack" Electronics 13, no. 11: 2226. https://doi.org/10.3390/electronics13112226
APA StyleHkiri, A., Alqurashi, S., Ben Bahri, O., Karmani, M., Faraj, H., & Machhout, M. (2024). Performance Evaluation of Mobile RPL-Based IoT Networks under Hello Flood Attack. Electronics, 13(11), 2226. https://doi.org/10.3390/electronics13112226