Effect of DIS Attack on 6TiSCH Network Formation

Alakesh Kalita, Alessandro Brighente, Manas Khatua, Mauro Conti

Research output: Contribution to journalArticleScientificpeer-review

10 Citations (Scopus)
71 Downloads (Pure)

Abstract

The 6TiSCH standard provides minimum latency and reliability in mission-critical IoT applications. To optimize resource allocation during 6TiSCH network formation, IETF released the 6TiSCH minimal configuration (6TiSCH-MC) standard. 6TiSCH-MC considered IETF's IPv6 Routing Protocol for Low power and Lossy network (RPL) as a routing protocol for both upward and downward routing. In RPL, new joining nodes or joined nodes transmit DODAG Information Solicitation (DIS) requests to get routing information from the network. However, we observe that malicious node(s) can severely affect 6TiSCH networks by sending multiple DIS requests. In this letter, we show and experimentally evaluate on real devices the impact of the DIS attack during 6TiSCH networks formation. We show that the attacker does not need expensive resources or access to the network's sensitive information to execute the DIS attack. Our testbed experiments show that the DIS attack significantly degrades the nodes' joining time and energy consumption, increasing them by 34% and 16%, respectively, compared to normal functioning during 6TiSCH network formation.

Original languageEnglish
Article number9724242
Pages (from-to)1190-1193
Number of pages4
JournalIEEE Communications Letters
Volume26
Issue number5
DOIs
Publication statusPublished - 2022

Bibliographical note

Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Keywords

  • 6TiSCH
  • DIS attack
  • Network formation
  • RPL Attack

Fingerprint

Dive into the research topics of 'Effect of DIS Attack on 6TiSCH Network Formation'. Together they form a unique fingerprint.

Cite this