The 5th International Conference on Future Networks &Amp; Distributed Systems 2021
DOI: 10.1145/3508072.3512286
|View full text |Cite
|
Sign up to set email alerts
|

Security in Internet of Things: RPL Attacks Taxonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
4
2
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…It is essential to evaluate whether the LSDT scheme can accommodate a large-scale deployment without compromising its performance and efficiency. Furthermore, it is important to study the potential impact of network latency and packet loss on the effectiveness of the LSDT scheme, as these factors hold significant importance in IoT environments [15]. By conducting a comprehensive study on how these issues can affect the scheme's performance, we can better understand the practical implications and optimize the scheme accordingly.…”
Section: Research Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is essential to evaluate whether the LSDT scheme can accommodate a large-scale deployment without compromising its performance and efficiency. Furthermore, it is important to study the potential impact of network latency and packet loss on the effectiveness of the LSDT scheme, as these factors hold significant importance in IoT environments [15]. By conducting a comprehensive study on how these issues can affect the scheme's performance, we can better understand the practical implications and optimize the scheme accordingly.…”
Section: Research Limitationsmentioning
confidence: 99%
“…Data transmission schemes can play a crucial role in overcoming or mitigating these challenges faced by IoT devices [15]. By employing our proposed lightweight secure data transmission (LSDT) scheme, the confidentiality and integrity of data exchanged between IoT devices and other components can be ensured.…”
Section: Introductionmentioning
confidence: 99%
“…Several works have introduced taxonomies to classify RPL attacks [13], [15], [59], [73]. The first RPL attacks taxonomy was proposed by Mayzaud et al [15].…”
Section: Proposed Rpl Replay Attacks Taxonomymentioning
confidence: 99%
“…These IoT devices are prevalent in diverse domains, including health care, smart cities, energy, smart homes, and industry. However, the IoT’s rapid development has resulted in potential areas of attack and created attractive targets in the form of weaknesses or vulnerabilities in the system [ 2 , 3 , 4 ]. Breaches in the security of IoT devices and networks can lead to disruption of system infrastructure, privacy violations, and other issues.…”
Section: Introductionmentioning
confidence: 99%