A Capacity-Aware Distributed Denial-of-Service Attack in Low-Power and Lossy Networks

Rajorshi Biswas, Jie Wu, Xiuqi Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Low-Power and Lossy Network (LLN) is composed of embedded devices with limited power, memory, and processing resources. LLN has a wide variety of applications including industrial monitoring, connected home, health care, urban sensor networks and environmental monitoring. LLN uses Routing Protocol for Low-power and lossy networks (RPL) protocol. The RPL maintains directed acyclic graphs for routing packets. By exploiting some features, a Distributed Denial-of-Service (DDoS) attack can be conducted easily. DDoS attacks are very popular and well studied in the context of the Internet, but not in the context of LLNs. In this paper, we propose a powerful DDoS attack framework in LLNs. We formulate the attack as an optimization problem for selecting an optimal set of attackers and their targeted neighbors constrained by a limited link bandwidth. We propose an optimal solution by transforming the optimization problem into a max-flow problem. We provide simulations to support our model.

Original languageEnglish (US)
Title of host publication2019 IEEE 40th Sarnoff Symposium, Sarnoff 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728124872
DOIs
StatePublished - Sep 2019
Event40th IEEE Sarnoff Symposium, Sarnoff 2019 - Newark, United States
Duration: Sep 23 2019Sep 24 2019

Publication series

Name2019 IEEE 40th Sarnoff Symposium, Sarnoff 2019

Conference

Conference40th IEEE Sarnoff Symposium, Sarnoff 2019
Country/TerritoryUnited States
CityNewark
Period9/23/199/24/19

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A Capacity-Aware Distributed Denial-of-Service Attack in Low-Power and Lossy Networks'. Together they form a unique fingerprint.

Cite this