A survey on RPL attacks and their countermeasures
نویسندگان
چکیده مقاله:
RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Example IoT applications are smart energy grid, smart home, connected car, intelligent transport systems, and smart cities. IoT is different from many similar technologies due to the existence of low power electronic circuits and limited connectivity. Information security is one of the main IoT concerns. The emergence of new types of security vulnerabilities in IoT devices and the escalation of their damages through numerous IoT applications is considered a major deployment drawback for RPL. In this paper, major cyberattacks against RPL, as well as related security solutions are addressed. Then, these solutions are classified and their weaknesses and strengths are investigated. Finally, it discusses the state-of-the-art status of information security in RPL.
منابع مشابه
A Survey on Passive Side-Channel Attacks and their Countermeasures for the NESSIE Public-Key Cryptosystems
Public-key cryptosystems are one of the basic building blocks of modern cryptographic systems. Therefore, it is important that they allow to be implemented resistant to several types of side-channel attacks. In this survey paper, we give an overview of the possible vulnerabilities of implementations of public-key cryptosystems that have been submitted to the NESSIE project and we additionally d...
متن کاملA Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures
Lately, Wireless Sensor Networks (WSNs) have become an emerging technology and can be utilized in some crucial circumstances like battlegrounds, commercial applications, habitat observing, buildings, smart homes, traffic surveillance and other different places. One of the foremost difficulties that WSN faces nowadays is protection from serious attacks. While organizing the sensor nodes in an ab...
متن کاملNote on side-channel attacks and their countermeasures
In the last few years ciphers making use of table-lookups in large tables—and most notably AES [12, 6]—have received a lot of bad publicity due to their vulnerability to cache attacks [15, 1, 13]. These attacks target the secret key by exploiting the variable time that an AES computation takes due to the storage of the large table in cache. From this one may conclude that algorithms that do not...
متن کاملWormhole Attacks and Countermeasures in Wireless Sensor Networks : A Survey
Wireless sensor networks can be deployed in inhospitable terrains or in hostile environments to provide continuous monitoring and processing capabilities. Due to the wireless and distributed nature, security is very crucial issue in wireless sensor network. Security comes from attacks. Detecting wormhole attack is very hard compared to other attacks because it uses private, out-of-band channel ...
متن کاملAttacks and Countermeasures in Sensor Networks: A Survey
2 Physical Layer 3 2.1 Attacks in the Physical Layer . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.1 Device Tampering . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.2 Eavesdropping . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.3 Jamming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2 Countermeasures in the Physical Layer . . . . . . . . . . . . ....
متن کاملRouting Attacks and Countermeasures in the RPL-Based Internet of Things
*e Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol standardized for constrained environments such as 6LoWPAN networks. Providing security in IPv6/RPL connected 6LoWPANs is challenging because the devices are connected to the untrusted Internet and are resource constrained, the communication links are lossy, and the devices use a set of novel IoT technologies ...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ذخیره در منابع من قبلا به منابع من ذحیره شده{@ msg_add @}
عنوان ژورنال
دوره 9 شماره 1
صفحات 30- 19
تاریخ انتشار 2021-04
با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.
کلمات کلیدی برای این مقاله ارائه نشده است
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023