Routing attacks and mitigation methods for RPL-based Internet of Things

A Raoof, A Matrawy, CH Lung - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
The recent bloom of Internet of Things (IoT) and its prevalence in many security-sensitive
environments made the security of these networks a crucial requirement. Routing in many of …

Proposing a secure RPL based internet of things routing protocol: a review

ZA Almusaylim, A Alhumam, NZ Jhanjhi - Ad Hoc Networks, 2020 - Elsevier
Abstract Nowadays, the Internet of Things (IoT) research domain attracts the researchers,
due to its extensive collection of applications and ease in deploying in several domains of …

MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications

A Seyfollahi, M Moodi, A Ghaffari - Computer Standards & Interfaces, 2022 - Elsevier
The intricate features and autonomous configuration of Routing Protocol for Low-power and
Lossy Networks (RPL) make it challenging to provide a key management solution and …

A comprehensive survey on enhancements and limitations of the RPL protocol: A focus on the objective function

H Lamaazi, N Benamar - Ad Hoc Networks, 2020 - Elsevier
The RPL routing protocol for low power and lossy networks uses the objective function (OF)
to build a Destination Oriented Directed Acyclic Graph (DODAG) based on a set of metrics …

Security against rank attack in RPL protocol

MA Boudouaia, A Ali-Pacha, A Abouaissa… - IEEE …, 2020 - ieeexplore.ieee.org
The Routing Protocol for Low Power and Lossy Networks (RPL) is experiencing a wave of
security threats, due to the need of its utility in the Internet of Things (IoT). RPL is so far …

A review of intrusion detection systems in RPL routing protocol based on machine learning for internet of things applications

A Seyfollahi, A Ghaffari - Wireless Communications and Mobile …, 2021 - Wiley Online Library
IPv6 routing protocol for low‐power and lossy networks (RPL) has been developed as a
routing agent in low‐power and lossy networks (LLN), where nodes' resource constraint …

Employing a machine learning approach to detect combined internet of things attacks against two objective functions using a novel dataset

J Foley, N Moradpoor, H Ochenyi - Security and …, 2020 - Wiley Online Library
One of the important features of routing protocol for low‐power and lossy networks (RPLs) is
objective function (OF). OF influences an IoT network in terms of routing strategies and …

EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things

AO Bang, UP Rao - Peer-to-Peer Networking and Applications, 2022 - Springer
Abstract Routing Protocol for Low Power and Lossy Networks (RPL) is the only standard
protocol that assists the routing process in Low Power and Lossy Networks (LLNs)-based …

Impact analysis of rank attack on RPL-based 6LoWPAN networks in Internet of Things and aftermaths

A Bang, UP Rao - Arabian Journal for Science and Engineering, 2023 - Springer
Routing protocol for low power and lossy networks (RPL) serves the routing process in
Internet Protocol version 6 over low-power wireless personal area network protocol stack …

Intrusion prevention scheme against rank attacks for software-defined low power IoT networks

C Miranda, G Kaddoum, A Boukhtouta, T Madi… - IEEE …, 2022 - ieeexplore.ieee.org
The 6LoWPAN (IPv6 over low-power wireless personal area networks) standard enables
resource-constrained devices to connect to the IPv6 network, blending an IPv6 header …