期刊
2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC)
卷 -, 期 -, 页码 1000-1006出版社
IEEE
DOI: 10.1109/CCWC51732.2021.9375844
关键词
IoT; 6LoWPAN; LLNs; RPL; NIDS for RPL
The resource-constrained nature of low power and lossy networks devices makes it difficult to implement efficient security mechanisms to defend against RPL routing attacks. Existing security functions within RPL are not sufficient in preventing a wide range of routing attacks, and optional security schemes can defend against external attacks but not internal attacks. Lack of mechanisms to verify the integrity of control messages further increases the threat level of RPL against routing attacks. Researchers have suggested various security mechanisms to mitigate these risks, but further exploration and enhancement are needed to improve RPL's overall security.
Low power and lossy networks (LLNs) devices resource-constrained nature make it difficult to implement security mechanisms to defend against RPL routing attacks. RPLs inbuilt security functions are not efficient in preventing a wide majority of routing attacks. RPLs optional security schemes can defend against external attacks, but cannot mitigate internal attacks. Moreover, RPL does not have any mechanism to verify the integrity of control messages used to keep topology updated and route the traffic. All these factors play a major role in increasing the RPLs threat level against routing attacks. In this paper, a comparative literature review of various researchers suggesting security mechanisms to mitigate security attacks aimed at RPL has been performed and methods have been contrasted.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据