Toward RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach

  • Hussah Albinali*
  • , Farag Azzedin
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

31 Scopus citations

Abstract

The RPL protocol was initially created to connect multiple IP-based communication applications in low-power and lossy network environments. However, it has become a target for numerous attacks, which have sparked a need for researchers to develop effective security measures. In this article, we conduct a comprehensive literature review covering 175 papers on RPL attacks and their mitigation solutions. Our rigorous selection process provides a deep understanding of how RPL is exploited for different attacks and the solutions designed to mitigate such attacks. Our study proposes RPL attacks taxonomy based on the attack vector, along with mitigation solutions taxonomy. RPL attacks are classified based on the attack vector, such as generating, dropping, modifying, or replaying specific control messages. The mitigation solutions include authenticating, updating, discarding, encrypting, and isolating attacking nodes. Furthermore, we presented evaluation metrics in the literature to evaluate the performance of mitigation solutions. Besides, we proposed efficiency criteria to assess mitigation solutions' efficiency. The review aims to uncover innovative techniques that can effectively safeguard networks against routing attacks.

Original languageEnglish
Pages (from-to)5215-5238
Number of pages24
JournalIEEE Transactions on Network and Service Management
Volume21
Issue number5
DOIs
StatePublished - 2024

Bibliographical note

Publisher Copyright:
© 2004-2012 IEEE.

Keywords

  • RPL
  • attacks classification
  • mitigation methods classification
  • routing attacks
  • systematic literature review

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Toward RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach'. Together they form a unique fingerprint.

Cite this