2022
DOI: 10.48550/arxiv.2201.06937
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Secure IoT Routing: Selective Forwarding Attacks and Trust-based Defenses in RPL Network

Abstract: IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is an essential routing protocol to enable communications for IoT networks with low power devices. RPL uses an objective function and routing constraints to find an optimized routing path for each node in the network. However, recent research has shown that topological attacks, such as selective forwarding attacks, pose great challenges to the secure routing of IoT networks. Many conventional secure routing solutions, on the other hand, are computati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…So, an attacker selects a portion of the information and forwards it to the destination; the remaining are dropped [30]. Selective attacks can cause massive damage to networks in general, and especially to IoT networks with low-power IPL (Routing Protocol for Low Power and Lossy) networks [55]. This type of attack can remain undetected for a long time, which can damage a network.…”
Section: Selective Forwardingmentioning
confidence: 99%
See 1 more Smart Citation
“…So, an attacker selects a portion of the information and forwards it to the destination; the remaining are dropped [30]. Selective attacks can cause massive damage to networks in general, and especially to IoT networks with low-power IPL (Routing Protocol for Low Power and Lossy) networks [55]. This type of attack can remain undetected for a long time, which can damage a network.…”
Section: Selective Forwardingmentioning
confidence: 99%
“…Many secure routing solutions are too computationally heavy for direct application on resource-constrained IoT networks. Therefore, a lightweight, trust-based defense scheme is needed to prevent selective forwarding attacks [55]. It consists of three modules: detection, notification, and isolation.…”
Section: • Countermeasuresmentioning
confidence: 99%