A Survey : Attacks on RPL and 6LoWPAN in IoT

被引:0
|
作者
Pongle, Pavan [1 ]
Chavan, Gurunath [1 ]
机构
[1] Sinhgad Coll Engn, Dept Comp Engn, Pune, Maharashtra, India
关键词
6LoWPAN; Attacks; Internet of Things; RPL; Security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard allows heavily constrained devices to connect to IPv6 networks. 6LoWPAN is novel IPv6 header compression protocol, it may go easily under attack. Internet of Things consist of devices which are limited in resource like battery powered, memory and processing capability etc. for this a new network layer routing protocol is designed called RPL (Routing Protocol for low power Lossy network). RPL is light weight protocol and doesn't have the functionality like of traditional routing protocols. This rank based routing protocol may goes under attack. Providing security in Internet of Things is challenging as the devices are connected to the unsecured Internet, limited resources, the communication links are lossy and set of novel technologies used such as RPL, 6LoWPAN etc. This paper focus on possible attacks on RPL and 6LoWPAN network, counter measure against them and consequences on network parameters. Along with comparative analysis of methods to mitigate these attacks are done and finally the research opportunities in network layer security are discussed.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] SIMULATING RPL ATTACKS IN 6LOWPAN FOR DETECTION PURPOSES
    Preda, Marius
    Patriciu, Victor-Valeriu
    [J]. 2020 13TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2020, : 239 - 245
  • [2] Analysis of Routing Attacks on RPL based 6LoWPAN Networks
    Verma, Abhishek
    Ranga, Virender
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2018, 11 (08): : 43 - 56
  • [3] Proactive Maintenance in RPL for 6LowPAN
    Khelifi, Nesrine
    Oteafy, Sharief
    Hassanein, Hossam
    Youssef, Habib
    [J]. 2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 993 - 999
  • [4] Mitigation of DIS flooding attacks in RPL-based 6LoWPAN networks
    Verma, Abhishek
    Ranga, Virender
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (02)
  • [5] Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT
    Verma, Abhishek
    Ranga, Virender
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (03) : 1571 - 1594
  • [6] Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT
    Abhishek Verma
    Virender Ranga
    [J]. Wireless Personal Communications, 2019, 108 : 1571 - 1594
  • [7] 6LoWPAN Forwarding Techniques for IoT
    Mc Gee, Kevin
    Collier, Martin
    [J]. 2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2019, : 888 - 893
  • [8] Performance Evaluation of RPL Routing Protocol in 6lowpan
    Xie, Haofei
    Zhang, Guoqi
    Su, Delong
    Wang, Ping
    Zeng, Feng
    [J]. 2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 625 - 628
  • [9] 6LoWPAN stacks: a survey
    Chen Yibo
    Hou, Kun-Mean
    Zhou, Haiying
    Shi, Hong-Ling
    Liu, Xing
    Diao, Xunxing
    Ding, Hao
    Li, Jian-Jin
    de Vaulx, Christophe
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [10] Aggregator Based RPL for an IoT-Fog Based Power Distribution System with 6LoWPAN
    Tom, Rijo Jackson
    Sankaranarayanan, Suresh
    de Albuquerque, Victor Hugo C.
    Rodrigues, Joel J. P. C.
    [J]. CHINA COMMUNICATIONS, 2020, 17 (01) : 104 - 117