Routing attacks and mitigation methods for RPL-based Internet of Things

A Raoof, A Matrawy, CH Lung - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
The recent bloom of Internet of Things (IoT) and its prevalence in many security-sensitive
environments made the security of these networks a crucial requirement. Routing in many of …

Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes

A Sharma, ES Pilli, AP Mazumdar, P Gera - Computer Communications, 2020 - Elsevier
Advancement in technology with the proliferation of new wireless communication protocols
gave rise to the new era of ubiquitous computing, called Internet of Things (IoT). IoT …

SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things

D Airehrour, JA Gutierrez, SK Ray - Future Generation Computer Systems, 2019 - Elsevier
Abstract The Routing Protocol for Low-Power and Lossy Networks (RPL), the de facto
routing protocol for Internet of Things (IoT) offers little protection against various forms of …

Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review

A Verma, V Ranga - IEEE Sensors Journal, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large
number of applications for the benefit of mankind. Advancements in embedded system …

Proposing a secure RPL based internet of things routing protocol: a review

ZA Almusaylim, A Alhumam, NZ Jhanjhi - Ad Hoc Networks, 2020 - Elsevier
Abstract Nowadays, the Internet of Things (IoT) research domain attracts the researchers,
due to its extensive collection of applications and ease in deploying in several domains of …

Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP

Z A. Almusaylim, NZ Jhanjhi, A Alhumam - Sensors, 2020 - mdpi.com
The rapid growth of the Internet of Things (IoT) and the massive propagation of wireless
technologies has revealed recent opportunities for development in various domains of real …

Assessment of routing attacks and mitigation techniques with RPL control messages: A survey

AO Bang, UP Rao, P Kaliyar, M Conti - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard routing protocol for
the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless …

Dynamic and comprehensive trust model for IoT and its integration into RPL

SY Hashemi, F Shams Aliee - The Journal of Supercomputing, 2019 - Springer
Ensuring security in IoT routing protocols is more challenging due to the fact that devices are
mobile, resource constrained, and heterogeneous. The routing protocol for low-power and …

Security against rank attack in RPL protocol

MA Boudouaia, A Ali-Pacha, A Abouaissa… - IEEE …, 2020 - ieeexplore.ieee.org
The Routing Protocol for Low Power and Lossy Networks (RPL) is experiencing a wave of
security threats, due to the need of its utility in the Internet of Things (IoT). RPL is so far …

CTrust‐RPL: A control layer‐based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks‐based Internet of Things …

T ul Hassan, M Asim, T Baker… - Transactions on …, 2021 - Wiley Online Library
Abstract Internet of Things (IoT) fostered a new epoch of innovation by interconnecting
digital devices to make human life more convenient and attractive. These smart objects are …