Securing Routing in Low Power and Lossy Networks

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Internet Engineering Task Force (IETF) introduced the RPL routing protocol to meet the routing requirements of the lossy networks. The inbuilt security features in the RPL design prevent external attacks but fail to mitigate internal attackers’ threats. The absence of robust security mechanisms in the RPL design has made it vulnerable to different categories of routing attacks. A comprehensive literature review is carried out in this study, which compares the mitigation approaches suggested by different authors in their research work. This paper aims to compare and evaluate different mitigation techniques in order to identify research trends, gaps, and opportunities. The existing research work is compared with one another in terms of the experimental setup, attack focus, proposed methodology, and performance metrics to determine the best approach for tackling the RPL routing attacks.

Cite

CITATION STYLE

APA

Kareem, M. A., & Tayeb, S. (2022). Securing Routing in Low Power and Lossy Networks. In Lecture Notes in Networks and Systems (Vol. 358 LNNS, pp. 330–344). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-89906-6_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free