Abstract:
The RPL is a distance vector routing protocol. It mainly targets collection-based
networks, where nodes periodically send measurements to a collection point. This RPL
protocol was basically designed to be highly adaptive to network conditions and
provide alternate routes, whenever default routes are inaccessible. RPL provides a
mechanism to disseminate information over a dynamically formed network topology.
The general task ofRPL i.e., is for low power and lossy network is to set up an optimal
DODAG (designation oriented Directed Acyclic Graph) in an LLN (low power and
lossy network) The most important feature ofrouting protocol which is for low power
and lossy network is an objective function (OF) it influences the IoT network in terms
of strategies based on routing as well as network topologies. This particular RPL
protocol has some flaws which expose it to attacks, the popular attacks manipulations
are objective function zero (OFO) and the minimum rank with hysteresis objective
function (MRFHOF). The following RPL protocol has some vulnerabilities related to
IoT based protocol and its objective functions which will result in a very deep and
extensive evaluation ofthe objective function of the RPL protocol. In this study, we
aim to assess the shortcoming of the Objective Function of RPL. Misappropriation
attacks (decreased rank attack and identity attack), and attacks targeting the objective
functions i.e Rank Identity Attack. To better understand the impact ofthis attack, we
also study the energy consumption and the packet delivery ratio under non-malicious
and malicious circumstances, using OFO and MRHOF