rpl-attacks: RPL attacks framework for simulating WSN with a malicious mote

RPL Attacks Framework

This project is aimed to provide a simple and convenient way to generate simulations and deploy malicious motes for a Wireless Sensor Network (WSN) that uses Routing Protocol for Low-power and lossy devices (RPL) as its network layer.

With this framework, it is possible to easily define campaign of simulations either redefining RPL configuration constants, modifying single lines from the ContikiRPL library or using an own external RPL library. Moreover, experiments in a campaign can be generated either based on a same or a randomized topology for each simulation.

A few test cases made with the framework:

Test case 1: flooding attack

The malicious mote has 3, 7, 10 in its rangePower tracking without the malicious motePower tracking with the malicious mote
The malicious mote has 3, 7, 10 in its rangePower tracking without the malicious motePower tracking with the malicious mote

Test case 2: versioning attack

Legitimate DODAGVersioning attack in action (global repair)
Legitimate DODAGVersioning attack
Power tracking without the malicious motePower tracking with the malicious mote
Power tracking without the malicious motePower tracking with the malicious mote

Test case 3a: blackhole attack

Legitimate DODAGBlackhole attack in action
Legitimate DODAGBlackhole attack

Test case 3b: blackhole attack

Legitimate DODAGBlackhole attack in action
Legitimate DODAGBlackhole attack

Install & Use

Copyright (C) 2018 dhondta 

Share