Mitigating UDP Flooding Attacks in 6TiSCH Networks: A Blacklisting and Routing Isolation Approach 6TiSCH A?glarinda UDP Flooding Saldirilarini Engelleme: Kara Listeye Alma ve Y nlendirme Izolasyonu Yaklasimi


AYDIN B., AYDIN H., GÖRMÜŞ S.

33rd IEEE Conference on Signal Processing and Communications Applications, SIU 2025, İstanbul, Türkiye, 25 - 28 Haziran 2025, (Tam Metin Bildiri) identifier

  • Yayın Türü: Bildiri / Tam Metin Bildiri
  • Doi Numarası: 10.1109/siu66497.2025.11111773
  • Basıldığı Şehir: İstanbul
  • Basıldığı Ülke: Türkiye
  • Anahtar Kelimeler: 6TiSCH Networks, Attack Detection, Blacklist, Routing Isolation, UDP Flooding
  • Karadeniz Teknik Üniversitesi Adresli: Evet

Özet

The rapid proliferation of IoT networks introduces critical security threats, particularly in 6TiSCH-based Low-power and Lossy Networks (LLNs). Among these, UDP Flooding attacks exploit TSCH scheduling, depleting network resources. This study proposes a detection and mitigation mechanism that monitors packet counts generated by nodes. If thresholds are exceeded, the attacker node is blacklisted and isolated from routing tables, minimizing its impact while preserving network efficiency. Experimental results demonstrate that the proposed method enhances key performance metrics, such as Packet Delivery Ratio (PDR), while reducing packet loss in MAC buffers. By effectively managing network resources, this approach strengthens resilience against UDP Flooding attacks in 6TiSCH networks.