Routing Attacks and Mitigation Methods for RPL-Based Internet of Things
IEEE Communications Surveys and Tutorials
The recent bloom of Internet of Things (IoT) and its prevalence in many security-sensitive environments made the security of these networks a crucial requirement. Routing in many of IoT networks has been performed using the Routing Protocol for Low Power and Lossy Networks (RPL), due to its energy-efficient mechanisms, secure modes availability, and its adaptivity to work in various environments; hence, RPL security has been the focus of many researchers. This paper presents a comprehensive study of RPL, its known attacks, and the mitigation methods proposed to counter these attacks. We conducted a detailed review of the RPL standard, including a recently proposed modification. Also, we investigated all recently published attacks on RPL and their mitigation methods through the literature. Based on this investigation, and to the best of our knowledge, we introduced a first-of-its-kind classification scheme for the mitigation methods that is based on the techniques used for the mitigation. Furthermore, we thoroughly discussed RPL-based Intrusion Detection Systems (IDSs) and their classifications, highlighting the most recently proposed IDSs.
|, , , , , , ,|
|IEEE Communications Surveys and Tutorials|
|Organisation||School of Information Technology|
Raoof, A. (Ahmed), Matrawy, A, & Lung, C.H. (2018). Routing Attacks and Mitigation Methods for RPL-Based Internet of Things. IEEE Communications Surveys and Tutorials. doi:10.1109/COMST.2018.2885894