A Classification of RPL Specific Attacks and Countermeasures in the Internet of Things
Title | A Classification of RPL Specific Attacks and Countermeasures in the Internet of Things |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Koosha, Mohammad, Farzaneh, Behnam, Farzaneh, Shahin |
Conference Name | 2022 Sixth International Conference on Smart Cities, Internet of Things and Applications (SCIoT) |
Date Published | Sep. |
Keywords | 6LoWPAN, composability, Internet of Things, Internet of Things (IoT), Mitigations in RPL, pubcrawl, resilience, Resiliency, Routing, Routing protocols, RPL, RPL attacks, smart cities, Wireless communication, Wireless personal area networks, Wireless sensor networks |
Abstract | Although 6LoWPAN has brought about a revolutionary leap in networking for Low-power Lossy Networks, challenges still exist, including security concerns that are yet to answer. The most common type of attack on 6LoWPANs is the network layer, especially routing attacks, since the very members of a 6LoWPAN network have to carry out packet forwarding for the whole network. According to the initial purpose of IoT, these nodes are expected to be resource-deficient electronic devices with an utterly stochastic time pattern of attachment or detachment from a network. This issue makes preserving their authenticity or identifying their malignity hard, if not impossible. Since 6LoWPAN is a successor and a hybrid of previously developed wireless technologies, it is inherently prone to cyber-attacks shared with its predecessors, especially Wireless Sensor Networks (WSNs) and WPANs. On the other hand, multiple attacks have been uniquely developed for 6LoWPANs due to the unique design of the network layer protocol of 6LoWPANs known as RPL. While there exist publications about attacks on 6LoWPANs, a comprehensive survey exclusively on RPL-specific attacks is felt missing to bold the discrimination between the RPL-specific and non-specific attacks. Hence, the urge behind this paper is to gather all known attacks unique to RPL in a single volume. |
DOI | 10.1109/SCIoT56583.2022.9953631 |
Citation Key | 9953631 |