#5, First Floor, 4th Street , Dr. Subbarayan Nagar, Kodambakkam, Chennai-600 024 pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Routing Attacks and defense Mechanisms for RPL Routing Protocol

The recent development of IoT in many security-sensitive environments enhances the importance of security in all layers. Several IoT networks implement the Routing Protocol for Low Power and Lossy Networks (RPL) in the network layer, due to its energy-efficient mechanisms. In basic, there are no security features hence, RPL security has been focused on by IoT researchers. There are several routing layer attacks, such as blackhole and selective forwarding attacks, sinkhole attacks, Sybil attacks, wormhole attacks, DoS attacks, and acknowledgment spoofing. To solve such security issues, widely used current security mechanisms are Trust measurement, Game-theoretic approaches, and Intrusion Detection Systems (IDS). However, they become inadequate for effectively handling sophisticated security and intelligent attacks.