Implementation of Rank Attack and Its Mitigation in RPL-Based IoT Networks
Madhu Yadav, Rajbir Kaur
2025
Abstract
The burgeoning interest in the Internet of Things (IoT) has led to the widespread deployment of Low-power and Lossy Networks (LLNs). The Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard protocol designed for networks with resource-constrained devices and high packet loss rates. However, RPL is vulnerable to various attacks, particularly rank attacks, which can disrupt network performance and compromise security. This paper addresses this gap by implementing rank attacks in RPL using the Cooja Simulator in Contiki OS and analyzing their impact on network performance. While rank attacks are extensively dis-cussed in the literature, practical implementations remain limited. To mitigate these attacks, we propose a novel trust-based mitigation strategy that integrates seamlessly with resource-constrained IoT devices. Our approach dynamically computes trust metrics to detect and isolate malicious nodes, thereby improving network security, reducing power consumption, and ensuring reliable packet transmission. Comparative analysis demonstrates the superiority of our approach over existing techniques, offering enhanced scalability and adaptability for secure IoT deployments.
DownloadPaper Citation
in Harvard Style
Yadav M. and Kaur R. (2025). Implementation of Rank Attack and Its Mitigation in RPL-Based IoT Networks. In Proceedings of the 10th International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS; ISBN 978-989-758-750-4, SciTePress, pages 215-222. DOI: 10.5220/0013205100003944
in Bibtex Style
@conference{iotbds25,
author={Madhu Yadav and Rajbir Kaur},
title={Implementation of Rank Attack and Its Mitigation in RPL-Based IoT Networks},
booktitle={Proceedings of the 10th International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS},
year={2025},
pages={215-222},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0013205100003944},
isbn={978-989-758-750-4},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 10th International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS
TI - Implementation of Rank Attack and Its Mitigation in RPL-Based IoT Networks
SN - 978-989-758-750-4
AU - Yadav M.
AU - Kaur R.
PY - 2025
SP - 215
EP - 222
DO - 10.5220/0013205100003944
PB - SciTePress