2020
DOI: 10.1109/access.2020.2977476
|View full text |Cite
|
Sign up to set email alerts
|

Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL)

Abstract: Destination Advertisement Objects (DAOs) are sent upward by RPL nodes toward the DODAG root, to build the downward routing paths carrying traffic from the root to its associated nodes. This routing mechanism can be exploited by a malicious node periodically transmitting a large volume of DAO messages towards its parent, which in turn will forward such messages to its own parent and so on, until they arrive at the Direction-Oriented Directed Acyclic Graph (DODAG) root. This ultimately results in a negative effe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(17 citation statements)
references
References 25 publications
0
17
0
Order By: Relevance
“…The work carried out by Shin et al [20] have developed an optimization mechanism for routing process in IoT focusing on securing authentication process. Wadhaj et al [21] have developed a preventive technique towards attack on IoT device using RPL protocol with a target to maximize the reliability score of attacker identification process. Saleem et al [22] have used a bio-inspired approach towards securing IoT communication over 5G.…”
Section: Related Workmentioning
confidence: 99%
“…The work carried out by Shin et al [20] have developed an optimization mechanism for routing process in IoT focusing on securing authentication process. Wadhaj et al [21] have developed a preventive technique towards attack on IoT device using RPL protocol with a target to maximize the reliability score of attacker identification process. Saleem et al [22] have used a bio-inspired approach towards securing IoT communication over 5G.…”
Section: Related Workmentioning
confidence: 99%
“…The nodes in the LowPAN network use the IEEE 802.15.4 standard to connect to each other. With the requirements of IPv6 based networks [7], the LLN networks [8] and consequently, the internet of things has undergone a structural change, which led to a wave of new research in the field of network routing protocols [9]. In this section, the most wellknown basic routing protocols for the internet of things are introduced and their standard abilities in this platform are assessed.…”
Section: Review Of Past Researchmentioning
confidence: 99%
“…It consumes more network resources and also prohibits the legitimate nodes to perform regular activities. Finally, the network will be in an inconsistent state which causes Denial of Service (DoS) attacks in the network [21].…”
Section: Dao Attacksmentioning
confidence: 99%