Security in Internet of Things: RPL Attacks Taxonomy

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Scopus citations

Abstract

The limitations of storage and computation capabilities in IoT devices raise challenges to design scalable protocols for different network sizes and maintain the minimum network delay. The nature of IoT makes existing routing protocols not suitable for IoT. As a result, IETF introduced IPv6 routing protocol over low-power and lossy networks. Unfortunately, there is no official implementation of security mechanisms that are defined as standard. This gap led to the appearance of many routing attacks utilizing the absence of RPL security mechanisms. In this article, we propose novel taxonomy to categorize RPL attacks based on the attack's mechanism. This taxonomy considers all RPL attacks whether inherited from WSN or resulted from exploiting RPL features. The taxonomy is evaluated to ensure usefulness and applicability.

Original languageEnglish
Title of host publicationICFNDS 2021 - 5th International Conference on Future Networks and Distributed Systems
Subtitle of host publicationThe Premier Conference on Smart Next Generation Networking Technologies
PublisherAssociation for Computing Machinery
Pages820-825
Number of pages6
ISBN (Electronic)9781450387347
DOIs
StatePublished - 15 Dec 2021

Publication series

NameACM International Conference Proceeding Series

Bibliographical note

Publisher Copyright:
© 2021 ACM.

Keywords

  • Attacks
  • IoT
  • Security
  • Taxonomy

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Security in Internet of Things: RPL Attacks Taxonomy'. Together they form a unique fingerprint.

Cite this