Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review

03/01/2023
by   Abhishek Verma, et al.
0

Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. However, global connectivity and resource constrained characteristics of smart devices have exposed them to different insider and outsider attacks, which put users' security and privacy at risk. Various risks associated with IoT slow down its growth and become an obstruction in the worldwide adoption of its applications. In RFC 6550, the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) is specified by IETF's ROLL working group for facilitating efficient routing in 6LoWPAN networks, while considering its limitations. Due to resource constrained nature of nodes in the IoT, RPL is vulnerable to many attacks that consume the node's resources and degrade the network's performance. In this paper, we present a study on various attacks and their existing defense solutions, particularly to RPL. Open research issues, challenges, and future directions specific to RPL security are also discussed. A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding. In addition, a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is also carried out.

READ FULL TEXT
research
03/29/2023

Assessing the Impact of Mobile Attackers on RPL-based Internet of Things

The Internet of Things (IoT) is becoming ubiquitous in our daily life. I...
research
09/19/2019

A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks

The 5G networks have the capability to provide high compatibility for th...
research
05/04/2022

V'CER: Efficient Certificate Validation in Constrained Networks

We address the challenging problem of efficient trust establishment in c...
research
05/17/2021

Towards Novel Multipath Data Scheduling For Future IoT Systems: A Survey

During the initial years of its inception, the Internet was widely used ...
research
01/13/2022

D-Box: DMA-enabled Compartmentalization for Embedded Applications

Embedded and Internet-of-Things (IoT) devices have seen an increase in a...
research
08/03/2020

Exposed Buffer Architecture for Programmable and Stateful Networking

Exposed Buffer Architecture addresses network ossification by confrontin...

Please sign up or login with your details

Forgot password? Click here to reset