Implementation of Rank Attack and Its Mitigation in RPL-Based IoT Networks

Madhu Yadav, Rajbir Kaur

2025

Abstract

The burgeoning interest in the Internet of Things (IoT) has led to the widespread deployment of Low-power and Lossy Networks (LLNs). The Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard protocol designed for networks with resource-constrained devices and high packet loss rates. However, RPL is vulnerable to various attacks, particularly rank attacks, which can disrupt network performance and compromise security. This paper addresses this gap by implementing rank attacks in RPL using the Cooja Simulator in Contiki OS and analyzing their impact on network performance. While rank attacks are extensively dis-cussed in the literature, practical implementations remain limited. To mitigate these attacks, we propose a novel trust-based mitigation strategy that integrates seamlessly with resource-constrained IoT devices. Our approach dynamically computes trust metrics to detect and isolate malicious nodes, thereby improving network security, reducing power consumption, and ensuring reliable packet transmission. Comparative analysis demonstrates the superiority of our approach over existing techniques, offering enhanced scalability and adaptability for secure IoT deployments.

Download


Paper Citation


in Harvard Style

Yadav M. and Kaur R. (2025). Implementation of Rank Attack and Its Mitigation in RPL-Based IoT Networks. In Proceedings of the 10th International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS; ISBN 978-989-758-750-4, SciTePress, pages 215-222. DOI: 10.5220/0013205100003944


in Bibtex Style

@conference{iotbds25,
author={Madhu Yadav and Rajbir Kaur},
title={Implementation of Rank Attack and Its Mitigation in RPL-Based IoT Networks},
booktitle={Proceedings of the 10th International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS},
year={2025},
pages={215-222},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0013205100003944},
isbn={978-989-758-750-4},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 10th International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS
TI - Implementation of Rank Attack and Its Mitigation in RPL-Based IoT Networks
SN - 978-989-758-750-4
AU - Yadav M.
AU - Kaur R.
PY - 2025
SP - 215
EP - 222
DO - 10.5220/0013205100003944
PB - SciTePress