rpl-attacks: RPL attacks framework for simulating WSN with a malicious mote
RPL Attacks Framework
This project is aimed to provide a simple and convenient way to generate simulations and deploy malicious motes for a Wireless Sensor Network (WSN) that uses Routing Protocol for Low-power and lossy devices (RPL) as its network layer.
With this framework, it is possible to easily define campaign of simulations either redefining RPL configuration constants, modifying single lines from the ContikiRPL library or using an own external RPL library. Moreover, experiments in a campaign can be generated either based on a same or a randomized topology for each simulation.
A few test cases made with the framework:
Test case 1: flooding attack
The malicious mote has 3, 7, 10 in its range | Power tracking without the malicious mote | Power tracking with the malicious mote |
---|---|---|
Test case 2: versioning attack
Legitimate DODAG | Versioning attack in action (global repair) |
---|---|
Power tracking without the malicious mote | Power tracking with the malicious mote |
---|---|
Test case 3a: blackhole attack
Legitimate DODAG | Blackhole attack in action |
---|---|
Test case 3b: blackhole attack
Legitimate DODAG | Blackhole attack in action |
---|---|
Install & Use
Copyright (C) 2018 dhondta