[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
:: Volume 9, Issue 1 (8-2020) ::
3 2020, 9(1): 30-19 Back to browse issues page
A survey on RPL attacks and their countermeasures
Mohammad Pishdar, Younes Seifi, Mozafar Bag-mohammadi
Bu-ali sina University
Abstract:   (960 Views)
RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Example IoT applications are smart energy grid, smart home, connected car, intelligent transport systems, and smart cities. IoT is different from many similar technologies due to the existence of low power electronic circuits and limited connectivity. Information security is one of the main IoT concerns. The emergence of new types of security vulnerabilities in IoT devices and the escalation of their damages through numerous IoT applications is considered a major deployment drawback for RPL. In this paper, major cyberattacks against RPL, as well as related security solutions are addressed. Then, these solutions are classified and their weaknesses and strengths are investigated. Finally, it discusses the state-of-the-art status of information security in RPL. 
Keywords: Internet of Things, RPL routing Protocol, Security in IOT, Security in RPL
Full-Text [PDF 1017 kb]   (440 Downloads)    
Type of Study: Scientific extension | Subject: Special
Received: 2020/11/20 | Accepted: 2021/04/4 | Published: 2021/05/10
Send email to the article author

Add your comments about this article
Your username or Email:


XML   Persian Abstract   Print

Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Pishdar M, Seifi Y, bag-mohammadi M. A survey on RPL attacks and their countermeasures. 3 2020; 9 (1) :30-19
URL: http://monadi.isc.org.ir/article-1-179-en.html

Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 9, Issue 1 (8-2020) Back to browse issues page
دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.04 seconds with 30 queries by YEKTAWEB 4514