Effect of DIS Attack on 6TiSCH Network Formation
The 6TiSCH standard provides minimum latency and reliability in mission-critical IoT applications. To optimize resource allocation during 6TiSCH network formation, IETF released the 6TiSCH minimal configuration (6TiSCH-MC) standard. 6TiSCH-MC considered IETF's IPv6 Routing Protocol for Low powe...
Gespeichert in:
| Veröffentlicht in: | IEEE communications letters Jg. 26; H. 5; S. 1190 - 1193 |
|---|---|
| Hauptverfasser: | , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
New York
IEEE
01.05.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Schlagworte: | |
| ISSN: | 1089-7798, 1558-2558 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | The 6TiSCH standard provides minimum latency and reliability in mission-critical IoT applications. To optimize resource allocation during 6TiSCH network formation, IETF released the 6TiSCH minimal configuration (6TiSCH-MC) standard. 6TiSCH-MC considered IETF's IPv6 Routing Protocol for Low power and Lossy network (RPL) as a routing protocol for both upward and downward routing. In RPL, new joining nodes or joined nodes transmit DODAG Information Solicitation (DIS) requests to get routing information from the network. However, we observe that malicious node(s) can severely affect 6TiSCH networks by sending multiple DIS requests. In this letter, we show and experimentally evaluate on real devices the impact of the DIS attack during 6TiSCH networks formation. We show that the attacker does not need expensive resources or access to the network's sensitive information to execute the DIS attack . Our testbed experiments show that the DIS attack significantly degrades the nodes' joining time and energy consumption, increasing them by 34% and 16%, respectively, compared to normal functioning during 6TiSCH network formation. |
|---|---|
| AbstractList | The 6TiSCH standard provides minimum latency and reliability in mission-critical IoT applications. To optimize resource allocation during 6TiSCH network formation, IETF released the 6TiSCH minimal configuration (6TiSCH-MC) standard. 6TiSCH-MC considered IETF’s IPv6 Routing Protocol for Low power and Lossy network (RPL) as a routing protocol for both upward and downward routing. In RPL, new joining nodes or joined nodes transmit DODAG Information Solicitation (DIS) requests to get routing information from the network. However, we observe that malicious node(s) can severely affect 6TiSCH networks by sending multiple DIS requests. In this letter, we show and experimentally evaluate on real devices the impact of the DIS attack during 6TiSCH networks formation. We show that the attacker does not need expensive resources or access to the network’s sensitive information to execute the DIS attack . Our testbed experiments show that the DIS attack significantly degrades the nodes’ joining time and energy consumption, increasing them by 34% and 16%, respectively, compared to normal functioning during 6TiSCH network formation. |
| Author | Brighente, Alessandro Khatua, Manas Kalita, Alakesh Conti, Mauro |
| Author_xml | – sequence: 1 givenname: Alakesh orcidid: 0000-0003-0277-9671 surname: Kalita fullname: Kalita, Alakesh email: alakesh.kalita1025@gmail.com organization: Department of Computer Science and Engineering, Indian Institute of Technology Guwahati, Guwahati, India – sequence: 2 givenname: Alessandro orcidid: 0000-0001-6138-2995 surname: Brighente fullname: Brighente, Alessandro email: alessandro.brighente@unipd.it organization: Department of Mathematics and HIT Research Center, University of Padova, Padova, Italy – sequence: 3 givenname: Manas orcidid: 0000-0002-8329-2429 surname: Khatua fullname: Khatua, Manas email: manaskhatua@iitg.ac.in organization: Department of Computer Science and Engineering, Indian Institute of Technology Guwahati, Guwahati, India – sequence: 4 givenname: Mauro orcidid: 0000-0002-3612-1934 surname: Conti fullname: Conti, Mauro email: conti@math.unipd.it organization: Department of Mathematics and HIT Research Center, University of Padova, Padova, Italy |
| BookMark | eNp9kE1LAzEQhoNUsK3-Ab0seN6aTDbZ5FjW1hZae2g9h3Q3ge3HpmZTxH9v-oEHDzIw88LMMzO8PdRpXGMQeiR4QAiWL7NiMZ8PAAMMKGFMSrhB3ShECjF1osZCpnkuxR3qte0GYyyAkS7CI2tNGRJnk9fpMhmGoMtt4pqEr-plMUneTfhyfpuMnd_rULvmHt1avWvNw7X20cd4tCom6WzxNi2Gs7QEyUJKLcsybg3BmdWmslHKnLK1IGvArMo4Y5lhwoDIwXBdal5hyHRexoamFaV99HzZe_Du82jaoDbu6Jt4UgHngCXHTMYpcZkqvWtbb6wq63D-M3hd7xTB6uSPOvujTv6oqz8RhT_owdd77b__h54uUG2M-QVkDlkM-gMNEHBj |
| CODEN | ICLEF6 |
| CitedBy_id | crossref_primary_10_1109_JIOT_2023_3234300 crossref_primary_10_1109_TNSE_2024_3363004 crossref_primary_10_1016_j_comnet_2024_110308 crossref_primary_10_1016_j_comnet_2024_110759 crossref_primary_10_1145_3536166 crossref_primary_10_3390_app13084878 crossref_primary_10_3390_su15010053 crossref_primary_10_1109_JIOT_2023_3339492 crossref_primary_10_1016_j_adhoc_2025_103864 crossref_primary_10_3390_app131810366 crossref_primary_10_1016_j_comcom_2022_07_054 |
| Cites_doi | 10.1109/TMC.2020.2980828 10.1109/TMC.2018.2828835 10.17487/rfc6550 10.1109/LCOMM.2017.2738629 10.1109/IEEESTD.2016.7460875 10.17487/RFC8180 10.1145/3430380 10.1002/ett.3802 10.1109/IEEESTD.2005.96290 10.1109/COMST.2019.2939407 10.1109/COMST.2018.2885894 10.1109/JIOT.2021.3080735 10.1109/ICCNC.2019.8685628 10.1109/ICWR.2019.8765272 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
| DBID | 97E RIA RIE AAYXX CITATION 7SP 8FD L7M |
| DOI | 10.1109/LCOMM.2022.3155992 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE/IET Electronic Library CrossRef Electronics & Communications Abstracts Technology Research Database Advanced Technologies Database with Aerospace |
| DatabaseTitle | CrossRef Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts |
| DatabaseTitleList | Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1558-2558 |
| EndPage | 1193 |
| ExternalDocumentID | 10_1109_LCOMM_2022_3155992 9724242 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Science and Engineering Research Board; Science and Engineering Research Board SERB India grantid: Not availabe funderid: 10.13039/501100001843 |
| GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ATWAV AZLTO BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IES IFIPE IFJZH IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS TN5 VH1 AAYXX CITATION 7SP 8FD L7M |
| ID | FETCH-LOGICAL-c295t-3f5446fe104faedf6fe9735b81b205d46554e58e2872e6aca6d024a7c655a3d33 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 13 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000793807500051&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1089-7798 |
| IngestDate | Mon Jun 30 10:19:30 EDT 2025 Tue Nov 18 22:18:45 EST 2025 Sat Nov 29 03:56:09 EST 2025 Wed Aug 27 02:37:58 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 5 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c295t-3f5446fe104faedf6fe9735b81b205d46554e58e2872e6aca6d024a7c655a3d33 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-3612-1934 0000-0001-6138-2995 0000-0002-8329-2429 0000-0003-0277-9671 |
| PQID | 2662096059 |
| PQPubID | 85419 |
| PageCount | 4 |
| ParticipantIDs | crossref_citationtrail_10_1109_LCOMM_2022_3155992 crossref_primary_10_1109_LCOMM_2022_3155992 ieee_primary_9724242 proquest_journals_2662096059 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-05-01 |
| PublicationDateYYYYMMDD | 2022-05-01 |
| PublicationDate_xml | – month: 05 year: 2022 text: 2022-05-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE communications letters |
| PublicationTitleAbbrev | LCOMM |
| PublicationYear | 2022 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref12 ref14 ref11 ref10 ref2 ref1 ref8 ref7 ref9 ref4 ref3 ref6 ref5 |
| References_xml | – ident: ref12 doi: 10.1109/TMC.2020.2980828 – ident: ref11 doi: 10.1109/TMC.2018.2828835 – ident: ref4 doi: 10.17487/rfc6550 – ident: ref6 doi: 10.1109/LCOMM.2017.2738629 – ident: ref1 doi: 10.1109/IEEESTD.2016.7460875 – ident: ref3 doi: 10.17487/RFC8180 – ident: ref13 doi: 10.1145/3430380 – ident: ref9 doi: 10.1002/ett.3802 – ident: ref10 doi: 10.1109/IEEESTD.2005.96290 – ident: ref2 doi: 10.1109/COMST.2019.2939407 – ident: ref5 doi: 10.1109/COMST.2018.2885894 – ident: ref14 doi: 10.1109/JIOT.2021.3080735 – ident: ref7 doi: 10.1109/ICCNC.2019.8685628 – ident: ref8 doi: 10.1109/ICWR.2019.8765272 |
| SSID | ssj0008251 |
| Score | 2.4524162 |
| Snippet | The 6TiSCH standard provides minimum latency and reliability in mission-critical IoT applications. To optimize resource allocation during 6TiSCH network... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1190 |
| SubjectTerms | 6TiSCH DIS attack Energy consumption Joining processes Multicast algorithms Network formation Network latency Network reliability Nodes Resource allocation Routing Routing protocols RPL attack Synchronization |
| Title | Effect of DIS Attack on 6TiSCH Network Formation |
| URI | https://ieeexplore.ieee.org/document/9724242 https://www.proquest.com/docview/2662096059 |
| Volume | 26 |
| WOSCitedRecordID | wos000793807500051&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1558-2558 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0008251 issn: 1089-7798 databaseCode: RIE dateStart: 19970101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA5zeNCDv6Y4nZKDN61bk2ZpjmM6JmxT2JTdSpu8wFBW2Tr_fpP0B4oieAs0CeVL-9772ve-h9BV4gdcgdIeKEa8wIT8XhLoxPNVHASUaD9xvQheRnwyCedz8VRDN1UtDAC45DO4tUP3L1-lcmM_lbUFt8UMxuBucc7zWq3K6toSzDyZXpiIUYRlgUxHtEf9x_HYUEFCDEO1ClvkmxNyXVV-mGLnXwb7_7uzA7RXxJG4lx_8IarB8gjtflEXbKBOrkyMU43vHqa4l2WxfMXpEndni2l_iCd5BjgelPWLx-h5cD_rD72iQYIniWCZRzUzbE6DoVQ6NoCboeCUJaFFmCkrjRYAC8GwIgLdWMZdZVxyzKW5EFNF6QmqL9MlnCKcSCb8RAlFwOwpQVBNuWE7YCiyIJA0kV8iFslCPdw2sXiLHIvoiMihHFmUowLlJrqu1rzn2hl_zm5YXKuZBaRN1CoPJiper3VkogpiuRcTZ7-vOkc7du88M7GF6tlqAxdoW35ki_Xq0j05nwqpvYo |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEB5KFdSDrypWq-7Bm8Y2m-ceS7W0mEahVXoLye4EipJIm_r73c0LRRG8LWQ3Cd8mM_Ml880AXEW66QgUsYbCopopQ34tMuNI00VomgaN9SjvRfDiOb7vzufsqQE3tRYGEfPkM7xVw_xfvkj5Wn0q6zJHiRmkwd2wTJPqhVqrtrtKhFmk0zMZMzK3ksj0WNcbPE4mkgxSKjmqqrFFv7mhvK_KD2Oce5jh3v_ubR92y0iS9IutP4AGJoew86W-YAt6RW1iksbkbjwl_SwL-StJE2LPFtPBiPhFDjgZVgrGI3ge3s8GI61skaBxyqxMM2KJhB2jJFVxKCGXQ-YYVuQqjC2hiqOZaLkoeRFFO-ShLaRTDh0uD4SGMIxjaCZpgidAIm4xPRJMUJTn5MiM2HAk30FJkhnFqA16hVjAy_rhqo3FW5DziB4LcpQDhXJQotyG63rNe1E948_ZLYVrPbOEtA2damOC8gVbBTKuoIp9Wez091WXsDWaTbzAG_sPZ7CtrlPkKXagmS3XeA6b_CNbrJYX-VP0CRefwNE |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Effect+of+DIS+Attack+on+6TiSCH+Network+Formation&rft.jtitle=IEEE+communications+letters&rft.au=Kalita%2C+Alakesh&rft.au=Brighente%2C+Alessandro&rft.au=Khatua%2C+Manas&rft.au=Conti%2C+Mauro&rft.date=2022-05-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1089-7798&rft.eissn=1558-2558&rft.volume=26&rft.issue=5&rft.spage=1190&rft_id=info:doi/10.1109%2FLCOMM.2022.3155992&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1089-7798&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1089-7798&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1089-7798&client=summon |