2017 International Conference on Emerging Trends &Amp; Innovation in ICT (ICEI) 2017
DOI: 10.1109/etiict.2017.7977006
|View full text |Cite
|
Sign up to set email alerts
|

Security attacks and secure routing protocols in RPL-based Internet of Things: Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
49
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 71 publications
(51 citation statements)
references
References 11 publications
1
49
0
1
Order By: Relevance
“…Security weaknesses in the current RPL protocol standard [15] are highlighted in [42]. No protection is specified against selective forwarding attacks, sinkhole attacks, black and gray hole attacks, and version number manipulation attacks.…”
Section: B Trust Modelsmentioning
confidence: 99%
“…Security weaknesses in the current RPL protocol standard [15] are highlighted in [42]. No protection is specified against selective forwarding attacks, sinkhole attacks, black and gray hole attacks, and version number manipulation attacks.…”
Section: B Trust Modelsmentioning
confidence: 99%
“…The goal is for the compromised node to be conveniently placed on the RPL topology, so it becomes a legitimate router of most of the packets on the network. This can be achieved by exploiting well-known RPL vulnerabilities [5] (e.g. rank attack, version number attack).…”
Section: Hypothesismentioning
confidence: 99%
“…Spoofing attacks have grown exponentially in the last few years [14][15][16]. Among other areas, social networks have recently reported serious privacy and security issues [17][18][19].…”
Section: Introductionmentioning
confidence: 99%