2022
DOI: 10.1145/3494524
|View full text |Cite
|
Sign up to set email alerts
|

Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey

Abstract: Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard routing protocol for the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) protocol stack. Features such as energy-efficient mechanisms and availability of the secure modes of operations make RPL suitable for the constrained Internet of Things (IoT) devices. Hence, the majority of IoT applications rely on RPL for data communication. However, routing security in RPL-based IoT… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(12 citation statements)
references
References 93 publications
0
12
0
Order By: Relevance
“…To handle Sybil attack issues in the WSN applications employed in digital transportation, Syed et al [78], proposed a two-phase securitybased framework utilizing Public Key Infrastructure (PKI) and hash function algorithms. Different Sybil attacks counteractions are discussed in references [79], if anyone is interested to explore this topic, we suggest them to follow the highlighted survey articles.…”
Section: B Network Layer Counteraction Schemes Of Swsnmentioning
confidence: 99%
“…To handle Sybil attack issues in the WSN applications employed in digital transportation, Syed et al [78], proposed a two-phase securitybased framework utilizing Public Key Infrastructure (PKI) and hash function algorithms. Different Sybil attacks counteractions are discussed in references [79], if anyone is interested to explore this topic, we suggest them to follow the highlighted survey articles.…”
Section: B Network Layer Counteraction Schemes Of Swsnmentioning
confidence: 99%
“…The rise in the number and sophistication of unknown cyber-attacks, on the other hand, has cast a pall over the adoption of these smart services. This is due to the fact that the diversity and distribution of IoT applications/services make IoT security hard and di cult [7], [3]. Furthermore, because of the unique service requirements of IoT, which cannot be met by centralized methods, attack detection in IoT is drastically different from previous techniques.…”
Section: Introductionmentioning
confidence: 99%
“…Firewalls alone are insu cient to secure the network due to dynamic topology and di culty in having physical access. [3] authors have analyzed routing security in RPL routing protocol for lossy networks especially those having low power as in the case of IoT. The authors have given a complete statistical analysis involving various mitigation techniques used in RPL-based networks.…”
Section: Introductionmentioning
confidence: 99%
“…As smart applications collect sensitive data, it is important to consider security and privacy issues at different levels of the architecture while designing and implementing these applications [8]. One of these security concerns is securing data transmission between IoT devices by ensuring confidentiality, authentication, and integrity in data routing [9]- [11].…”
Section: Introductionmentioning
confidence: 99%
“…As such, many researchers have examined IoT security challenges [9], [12]- [15]. According to the literature, Raoof et al [13] and Mayzaud et al in [15] illustrated more than 15 types of RPL attacks.…”
Section: Introductionmentioning
confidence: 99%