2014
DOI: 10.14419/jacst.v3i2.3321
|View full text |Cite
|
Sign up to set email alerts
|

Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions

Abstract: RPL (Routing Protocol for Low-power and lossy networks) is a specific routing protocol designed to optimize 6LoWPAN (IPv6 over Low power Wireless Personal Area Network) operation. As 6LoWPAN suffers from resource constraints on battery, processor, memory and bandwidth, it affects the performance of the RPL protocol. From security point of view, this will make RPL vulnerable to several threats directly or indirectly. Thus, cryptographic systems are not sufficient to protect the RPL from internal attacks; a comp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 39 publications
(17 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…They proposed a mitigation approaches that counter to these attacks. In the routing level, Rghioui et al [101] surveyed the potential DoS attacks that could disturb RPL and 6LoWPAN IoT protocols. They proposed also mitigation solutions of theses attacks based on IDS approach.…”
Section: Iot Dos/ddos Countermeasure Approachesmentioning
confidence: 99%
“…They proposed a mitigation approaches that counter to these attacks. In the routing level, Rghioui et al [101] surveyed the potential DoS attacks that could disturb RPL and 6LoWPAN IoT protocols. They proposed also mitigation solutions of theses attacks based on IDS approach.…”
Section: Iot Dos/ddos Countermeasure Approachesmentioning
confidence: 99%
“…RPL protocol also undergoes security attacks very easily because RPL connects the network which has less processing power and less battery life. Attack like DoS attack affects the processor time, congestion in communication lines and bandwidth or denial of resources to intended users, etc [7].…”
Section: Fig 1: Iot Architecturementioning
confidence: 99%
“…Actually, fuzzy reasoning comprehensively evaluates a group of input values based on fuzzy inference rules, resulting in a determined output range, that is, fuzzy output [6] . After the fuzzy output is de-fuzzified, the fuzzy logic system finally outputs the exact value of 0 to 100, which represents the quality of the neighbor nodes, and then selects the node with the highest quality as the best parent node.…”
Section: Improved Algorithm Of Rpl Routing Protocol Based On 6lowpanmentioning
confidence: 99%