2020
DOI: 10.36227/techrxiv.12121971
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review

Abstract: <div>Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. However, global connectivity and resource constrained characteristics of smart devices have exposed them to different insider and outsider attacks, which put users’ security and privacy at risk. Various ris… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(19 citation statements)
references
References 83 publications
0
17
0
2
Order By: Relevance
“…Therefore, the effects of multiple attackers were generally omitted when evaluating the proposed solutions. A recent review study [29] also reported that most research in the literature used a low number of nodes in their experimental simulations. However, as pointed out in [9], at least 25 or 30 devices are actually needed in order to appraise the multihop characteristics of the RPL network.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, the effects of multiple attackers were generally omitted when evaluating the proposed solutions. A recent review study [29] also reported that most research in the literature used a low number of nodes in their experimental simulations. However, as pointed out in [9], at least 25 or 30 devices are actually needed in order to appraise the multihop characteristics of the RPL network.…”
Section: Discussionmentioning
confidence: 99%
“…Very recently, the same authors, Verma and Ranga [29],conducted a survey which investigated existing security mechanisms for RPL-based IoT networks in the literature. Their survey reviewed more than 100 published studies, and reported that no study used a crosslayered security solution based on both link layer and network layer activities.…”
Section: Related Studies On Intrusion Detection For Rpl-based Iot Networkmentioning
confidence: 99%
“…In the case of the healthcare sector, IoMT sensors and local devices can be connected to IP networks through 6LoWPAN, allowing the interconnection among a group of sensors. Furthermore, it allows the interconnection of sensors with middleware devices or Internet-connected routers [ 55 , 56 , 57 ].…”
Section: Classification Of Iot Protocols Used In Medical Devicesmentioning
confidence: 99%
“…In addition to the OF's policies, the structure of the trickle timer has also a pivotal role in maintaining this stability. Although, the trickle tries to mitigate the amount of control packet overhead by exponentially increasing the period between consecutive transmission of control packets, but due to the frequent inconsistencies in mobile infrastructures, the trickle will be reset to its initial values, and the control packets (DIO, DIS, DAO, and DAO-Ack) will be transmitted throughout the network with higher frequency to bring back the stability to the network [264]- [266]. More control packets results in more resource consumption in the nodes (especially energy and bandwidth) as well as possibly more number of collisions and lower reliability [267].…”
Section: ) Control Overheadmentioning
confidence: 99%