Amazing technological breakthrough possible @S-Logix

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • +91- 81240 01111

Social List

Routing Attacks and Mitigation Methods for RPL-Based Internet of Things - 2018

Routing Attacks And Mitigation Methods For RPL-Based Internet Of Things

Research Area:  Internet of Things


The recent bloom of Internet of Things (IoT) and its prevalence in many security-sensitive environments made the security of these networks a crucial requirement. Routing in many of IoT networks has been performed using the routing protocol for low power and lossy networks (RPL), due to its energy-efficient mechanisms, secure modes availability, and its adaptivity to work in various environments; hence, RPL security has been the focus of many researchers. This paper presents a comprehensive study of RPL, its known attacks, and the mitigation methods proposed to counter these attacks. We conducted a detailed review of the RPL standard, including a recently proposed modification. Also, we investigated all recently published attacks on RPL and their mitigation methods through the literature. Based on this investigation, and to the best of our knowledge, we introduced a first-of-its-kind classification scheme for the mitigation methods that is based on the techniques used for the mitigation. Furthermore, we thoroughly discussed RPL-based intrusion detection systems (IDSs) and their classifications, highlighting the most recently proposed IDSs.


Author(s) Name:  Ahmed Raoof; Ashraf Matrawy; Chung-Horng Lung

Journal name:  IEEE Communications Surveys & Tutorials

Conferrence name:  

Publisher name:  IEEE

DOI:  10.1109/COMST.2018.2885894

Volume Information:  Volume: 21, Issue: 2, Secondquarter 2019, Page(s): 1582 - 1606