This paper evaluates the performance of the RPL routing protocol for low power and lossy networks under sinkhole and selective forwarding attacks. Using the Contiki OS and COOJA simulator, the effects on power consumption as a quality of service parameter were analyzed across three experimental scenarios involving different configurations of attacking and normal nodes. The results indicate that malicious behavior significantly increases power consumption in neighboring nodes, highlighting vulnerabilities in RPL to internal network attacks.