Securing Routing in Low Power and Lossy Networks

2022 
The Internet Engineering Task Force (IETF) introduced the RPL routing protocol to meet the routing requirements of the lossy networks. The inbuilt security features in the RPL design prevent external attacks but fail to mitigate internal attackers’ threats. The absence of robust security mechanisms in the RPL design has made it vulnerable to different categories of routing attacks. A comprehensive literature review is carried out in this study, which compares the mitigation approaches suggested by different authors in their research work. This paper aims to compare and evaluate different mitigation techniques in order to identify research trends, gaps, and opportunities. The existing research work is compared with one another in terms of the experimental setup, attack focus, proposed methodology, and performance metrics to determine the best approach for tackling the RPL routing attacks.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    29
    References
    0
    Citations
    NaN
    KQI
    []