IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Impact of Decreased Rank Attack on Network Topology of RPL Using Contiki-NG

Impact of Decreased Rank Attack on Network Topology of RPL Using Contiki-NG
View Sample PDF
Author(s): Qais Al-Na'amneh (Applied Science Private University, Jordan), Walid Dhifallah (University of Gabes, Tunisia), Rahaf Hazaymih (Jordan University of Science and Technology, Jordan), Tasnim Al-Harasis (Al Hussein Technical University, Jordan), Mohammed Amin Almaiah (University of Jordan, Jordan), Braa Qadoumi (Applied Science Private University, Jordan)and Ayoub Alsarhan (Hashemite University, Jordan)
Copyright: 2025
Pages: 16
Source title: Cryptography, Biometrics, and Anonymity in Cybersecurity Management
Source Author(s)/Editor(s): Mohammed Amin Almaiah (Department of Computer Science, The University of Jordan, Jordan)and Said Salloum (School of Science, Engineering, and Environment, University of Salford, UK)
DOI: 10.4018/979-8-3693-8014-7.ch004

Purchase

View Impact of Decreased Rank Attack on Network Topology of RPL Using Contiki-NG on the publisher's website for pricing and purchasing information.

Abstract

The Internet of Things (IoT) refers to the widespread use of smart objects connected to the internet. This innovative technology serves as the foundation for various intelligent gadgets, including smartphones, smart homes, and electric equipment. Furthermore, these devices are uniquely identified and automatically connected to the network. RPL emphasizes security due to the nature of objects and their restrictions, which might pose weaknesses for cyber-attacks. It is crucial to identify and assess all potential assaults on this protocol, including the rank attack, which can significantly impact network performance and energy usage. The impact of rank assaults on the proactive IoT routing protocol, Low Power Lossy Network (RPL), is discussed in this study. It emphasizes the necessity of addressing these attacks concerning different scenarios preserving topology, avoiding communication delays, and reducing throughput. The proposed solution significantly decreases the impact of a decreased rank attack on network performance.

Related Content

Qais Al-Na'amneh, Rahaf Hazaymih, Tasnim Al-Harasis, Mohammed Amin Almaiah, Mahmoud Aljawarneh, Braa Qadoumi, Shahid Munir Shah. © 2025. 28 pages.
K. G. Anilkumar, D. Muhammad Noorul Mubarak. © 2025. 12 pages.
Tuqa Al-Makkawi, Ayoub Alsarhan, Qais Al-Na'amneh, Mohammad Aljaidi, Mohammed Amin Almaiah, Mahmoud AlJamal, Rabee Alqura'n, Mahmoud Aljawarneh. © 2025. 20 pages.
Qais Al-Na'amneh, Walid Dhifallah, Rahaf Hazaymih, Tasnim Al-Harasis, Mohammed Amin Almaiah, Braa Qadoumi, Ayoub Alsarhan. © 2025. 16 pages.
Brijesh Yadav, Vishal Jain. © 2025. 36 pages.
Malak Al-Majali, Mohammad Aljaidi, Qais Al-Naamneh, Ghassan Samara, Ayoub Alsarhan, Braa Qadoumi. © 2025. 14 pages.
S. Indra Priyadharshini, T. V. Padmavathy, D. Shiny Irene. © 2025. 18 pages.
Body Bottom