The Internet Engineering Task Force (IETF) introduced the RPL routing protocol to meet the routing requirements of the lossy networks. The inbuilt security features in the RPL design prevent external attacks but fail to mitigate internal attackers’ threats. The absence of robust security mechanisms in the RPL design has made it vulnerable to different categories of routing attacks. A comprehensive literature review is carried out in this study, which compares the mitigation approaches suggested by different authors in their research work. This paper aims to compare and evaluate different mitigation techniques in order to identify research trends, gaps, and opportunities. The existing research work is compared with one another in terms of the experimental setup, attack focus, proposed methodology, and performance metrics to determine the best approach for tackling the RPL routing attacks.
CITATION STYLE
Kareem, M. A., & Tayeb, S. (2022). Securing Routing in Low Power and Lossy Networks. In Lecture Notes in Networks and Systems (Vol. 358 LNNS, pp. 330–344). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-89906-6_23
Mendeley helps you to discover research relevant for your work.