This Work Is Licensed Under A License.: Creative Commons "Attribution-Noncommercial-Noderivatives 4.0 International"
This Work Is Licensed Under A License.: Creative Commons "Attribution-Noncommercial-Noderivatives 4.0 International"
1. Introduction
The Internet of Things (IoT) is critical for connecting and exchanging information with other things (physical
objects, sensors, and computing devices) and facilitating communication or data transfer over wireless links without
human intervention. IoT can be conceptualized as a system in which sensors collect data, gateways transmit it, and back-
end systems make intelligent decisions. The Internet of Things has numerous applications in agriculture, healthcare,
industry, markets, vehicles, transportation, and smart homes [1]. The various architectures have been proposed for IoT
based on user perspective [2]. The popular architecture are 3-layered [3], middle-ware [4] and service oriented [5].
The 3-layer based architecture provide abstraction on IoT devices and has perception, network and application layer.
The perception layer play the role of data collection and processing from IoT devices. The network layer provides the
secure connection and transmission of collected data from perception layer to application layer. The application layer
consist the user interfaces which provides the services to IoT users [6].
⋆
https://doi.org/10.1016/j.compeleceng.2025.110071
2018rcp9156@mnit.ac.in, anilkumar.prajapati@jaipur.manipal.edu (A.K. Prajapati); espilli.cse@mnit.ac.in
(**Corresponding Author) ( Emmanuel S. Pilli); rbbattula.cse@mnit.ac.in ( Ramesh Babu Battula);
vijay.varadharajan@newcastle.edu.au (V. Varadharajan); abhiverma866@gmail.com ( Abhishek Verma); rcjoshi.geu@gmail.com
(R. C. Joshi)
ORCID (s):
The main constraints for IoT networks are Low-power and lossy links, resulting in low throughput and high packet
drop rate. Due to these resource constraints, the ROLL working group created the Routing Protocol for Low-power and
Lossy Networks (RPL). Though RPL has security mechanisms, it is still vulnerable to emerging attacks. Researchers
have developed a significant number of security solutions during the development of the RPL protocol. Hence there
is still scope for security researchers to design a coherent defense mechanism for up-and-coming attacks[7]. The rapid
expansion of IoT devices has made it imperative to assign unique identifiers to each device; this issue has been addressed
with the introduction of the IPv6 protocol. Another primary concern for IoT devices is ensuring efficient and secure
routing from external attacks [8][9]. The 6LoWPAN [10], an IPv6-enabled low-power wireless personal area network,
provides the protocol stack for Low-power IoT devices and addresses both unique addressing and secure routing issues.
The 6LoWPAN protocol stack was developed by the IETF and is outlined in RFC 4944 [11]. The 6LoWPAN protocol
stack is depicted graphically in Fig. 1. The 6LoWPAN physical and link layers are designed for Low-power personal
area networks and are compliant with the IEEE standard 802.15.4. Layer 2.5, the adaption layer, primarily supports
the IPv6 requirements for the Maximum Transmission Unit (MTU) through header compression, fragmentation, and
reassembly. The network layer provides routing decisions and includes IPv6, ICMPv6, and RPL [12]. The transport
layer employs the UDP and ICMP protocols, while the application layer uses CoAP.
RPL, which stands for Routing Protocol for Low-Power and Lossy Networks, plays a pivotal role in IoT networks
by offering specialized optimization features tailored to the needs of low-power devices, lossy links, and scalable
connectivity. These key benefits significantly contribute to the overall efficiency and reliability of IoT systems: Firstly,
RPL excels in efficient resource usage by addressing the unique requirements of low-power devices while ensuring
seamless and dependable communication over lossy links. This capability not only enhances the overall performance
of IoT networks but also extends the lifespan of resource-constrained devices. Additionally, the scalability of RPL is
noteworthy, as it enables the protocol to effectively manage large-scale IoT deployments while remaining adaptable to
dynamic network topologies. This adaptability is crucial for ensuring uninterrupted connectivity and smooth operation
across diverse applications and industries such as smart homes, industrial IoT, smart cities, agriculture, and healthcare.
Moreover, RPL offers application-specific optimization strategies, allowing for customizable routing decisions based
on metrics like energy consumption, latency, and link quality. This fine-grained control facilitates efficient data
transmission and supports a wide range of applications, including multicast scenarios for tasks such as firmware updates
and group communication. Furthermore, RPL’s interoperability with IPv6 and its status as an IETF standard ensure
seamless integration and compatibility with various devices and systems in the IoT ecosystem. This standardization
contributes to a cohesive and interconnected network fabric that promotes efficient data exchange and communication.
Lastly, the inclusion of robust security features in RPL, such as encryption and secure key management protocols
[13, 14, 15] safeguards sensitive data and applications within IoT environments. This robust security framework
enhances the overall trustworthiness of IoT deployments and protects against potential threats and vulnerabilities.
In essence, RPL emerges as a cornerstone technology in the realm of IoT communication, offering a comprehensive
suite of features that optimize performance, reliability, scalability, and security across diverse IoT applications.
The primary principle of RPL is to support the Objective Function of specific applications specified in terms
of minimizing energy, latency, or constraints. RPL is a distance vector protocol for routing defined by the Direction-
Oriented Directed Acyclic Graph (DODAG), which divides the network into sub-directed acyclic graphs, each of which
contains constrained devices; all the traffic is directed towards the root node known as DAG root, which is represented
by an IPv6 Border Router or Gateway. RPL instances are DODAGs having multiple DODAGs. The Objective Function
(OF) helps nodes in DODAG in selecting and optimizing routes based on various routing metric constraints such
as Expected Transmission Count (ETX), link quality, latency, and color. Objective Function Zero (OF0) [16] and
Minimum Rank with Hysteresis Objective Function (MRHOF) [17] are the two standard objective functions defined
for RPL. The OF has a Rank-based mechanism to identify the best parent, the position of nodes relative to the root nodes,
or the nodes’ distance from the root in DODAG. In DODAG, the lowest rank node best suits the parent. RPL-specific
control messages keep the DODAG up to date. RPL control messages are represented by the ICMPv6 protocol. DODAG
Information Solicitation (DIS), DODAG Information Object (DIO), Destination Advertisement Object (DAO), and
Destination Advertisement Object Acknowledgment (DAO-ACK) are the RPL control messages that manage DODAG
construction and maintenance regularly by exchanging messages between DODAG nodes as shown in Fig. 2.
'$* 5RRW
5$1.
'$2 $&. 6 '$2 $&.
',2 ',2
',2 ',2
',2 ',2
'$2
',6
'$2
'$2
The Trickle Timer defined in RFC 6206 [18] is a dedicated algorithm described in RPL for DODAG maintenance
primarily responsible for synchronizing DIO messages. RPL aids Point-to-Point (P2P), Multipoint-to-Point (MP2P),
and Multipoint-to-Multipoint (MP2MP) traffic and functions in two modes: storing (each node maintains the routing
table) and non-storing (no routing information is stored). There are three modes of security supported by RPL. The
first one is preinstalled mode in which RPL control message are secured with symmetric keys. The second one is
authenticated mode in which node authentication is required at the time of joining and this operation is performed
using preinstalled keys. The third one is unsecured mode which resembles RPL with no security enabled. Many RPL
features, such as self-configuration, neighbor discovery, DODAG construction and maintenance mechanisms, route
construction processes, etc., are defined in RFC 6550 [12]. The principal contributions of this survey are:
1. A novel taxonomy for RPL-based routing attacks not addressed in prior research and analyze their impact on
Resource Consumption, Routing Decisions, and Performance Metrics.
2. A novel classification for RPL defense mechanisms based on different approaches, i.e., RPL-specification based,
Machine Intelligence based, Trust and Threshold etc.
3. Extensively discussion on the various existing RPL-based simulators, testbeds, and datasets.
The paper is organized as follows: Section 2 accounts for various existing and related surveys and highlights
the originality and significance of our survey. Section 3 discusses RPL-based attacks, classifies them, and analyses
their impact. Section 4 provides a detailed discussion of the defense mechanisms for RPL-based routing attacks. The
evaluation tools and testbeds are discussed in Section 5. We outline the existing and open research challenges for
further investigation in Section 6. Section 7 concludes the paper by summarizing the usefulness of the survey. The list
of abbreviations of key terms used in survey is shown in Table 1.
Table 1
List of Abbreviations
Abbreviation Stands For Abbreviation Stands For
IoT Internet of Things 6LoWPAN IPv6 Over Low-power Wireless Personal Area Network
IETF Internet Engineering Task Force ROLL Routing Over Low-power and Lossy Networks
LLN Low Power and Lossy Network RPL Routing Protocol for Low Power and Lossy Network
IPv6 Internet Protocol version 6 ICMPv6 Internet Control Message Protocol version 6
UDP User Datagram Protocol CIA Confidentiality, Integrity, and Availability
CoAP Constrained Application Protocol DODAG Destination Oriented Directed Acyclic Graph
OF Objective Function ETX Expected Transmission Count
OF0 Objective Function Zero MRHOF Minimum Rank with Hysteresis Objective Function
DIS DODAG Information Solicitation DIO DODAG Information Object
DAO Destination Advertisement Object DAO-ACK Destination Advertisement Object Acknowledgment
P2P Point-to-Point MP2P Multipoint-to- Point
IDS Intrusion Detection System DTSN DAO Trigger Sequence Number
PDR Packet Delivery Ratio E2ED End-to-End Delay
ML Machine Learning DL Deep Learning
CLI Command Line Interface GUI Graphical User Interface
2. Related Work
2.1. Existing Surveys
Researchers have published several surveys on intrusion detection systems and mitigation methods for RPL based
routing attacks in IoT networks, predominantly starting from 2010 and is still in its early stages. Wallgren et al. [19]
were the first to identify vulnerabilities in RPL-based routing attacks and proposed a lightweight defense mechanism
known as the heartbeat protocol against selective forwarding attacks. Pongle et al. [20] described an attack survey
on the 6LowPAN and RPL and intrusion detection mechanisms. They also discussed research trends for RPL and
6LoWPAN intrusion detection techniques. Airehrour et al.. [21] published a survey covering the routing protocol used
for IoT and classifying possible attacks based on CIA (Confidentiality, Integrity, and Availability). They investigated
some open issues and challenges for secure routing and also discussed trust models proposed by other researchers.
Mayzaud et al. [22] were the first to propose a taxonomy for RPL attack classification based on three aspects: topology,
resource, and traffic. They categorized the attacks as internal or external, active or passive, and described attack
prerequisites, impact assessment, proposed mitigation techniques, and assessment of their overheads. Kim et al. [23]
investigated RPL in terms of experimentation and simulation using ContikiOS or TinyOS and testbeds and proposed
future implementations of RPL optional functionalities. Zarpelao et al. [24] proposed a classification of intrusion
detection systems for IoT in terms of detection method, placement, validation strategy, and security threats. Mangelkar
et al. [25] provided a comparative study of attacks and classified them based on CIA in relation to attack type and name.
They also discussed the countermeasures proposed by various researchers. Kamgueu et al. [26] proposed a survey
of RPL topology optimization, security, and mobility. However, their work did not address defense mechanisms for
routing attacks. Raoof et al. [27] proposed an extensive survey of routing attacks in RPL and their mitigation. This work
categorized routing attacks based on their origin into RPL-specific and WSN-inherited attacks. They are the first to
classify attack mitigation techniques based on extensive research. In terms of mitigation, they included a summary and
insights for each attack in their survey. Their survey also outlined some research challenges and future directions. Verma
et al. [28] published a survey that described an improved taxonomy for RPL-based routing attacks and a classification
of defense mechanisms in terms of secure protocols and IDS. They also identified potential areas to investigate for
future RPL security research. Almusaylim et al. [29] proposed a review of defense mechanisms based on version
and rank attacks. Simoglou et al. [30] studied the design requirements, best practices, research gaps, and guidelines
for designing an intrusion detection system for RPL security from 2003 to 2020. Pasikhani et al. [31] provided an
assessment of the impact of each attack, statistical analysis for the defense mechanism, and a simulator for RPL along
with investigating existing IDS. Seyfollahi et al. [32] investigated the machine learning algorithms used to design an
IDS for securing RPL. Bang et al. [33] proposed a novel classification and mitigation mechanism for routing attacks
based on RPL control messages.
Table 2
Comparison of Existing Surveys on RPL Routing attacks and Defense Mechanisms
Ref Research Scope Technical Coverage Limitations
Span
[19] 2010-2013 RPL-based routing attacks RPL-based routing attacks implementation on No impact analysis and classification
and its counter measures. ContikiOS and highlights the placement of IDS of attacks.
for elimination of malicious node.
[20] 2011-2014 Routing attacks on RPL New routing attacks on RPL protocol with IDS No discussion about classification of
and 6LowPAN techniques and research trends. Attacks, Defense.
[21] 2011-2015 Secure communication for Classification of Routing attacks based on No classification of Defense Mecha-
IoT networks and routing confidentiality, availability, integrity and open nism.
protocols. research challenges with trust models.
[22] 2011-2016 Classification of RPL-based Proposed a taxonomy for classification of RPL- No discussion about the classification
Routing attacks in IoT net- based attacks on the basis of topology, re- of mitigation and future research di-
works. sources and traffic. rection.
[23] 2012-2017 Protocol for IPV6 based Discussion about the investigation and simu- No classification for routing attacks
routing on Low Power and lation of RPL using ContikiOS and TinyOS. and No detailed discussion about
Lossy Networks simulators.
[25] 2012-2016 Study for RPL-based rout- Comparative analysis of Attack Type and Not performed any classification of
ing attacks and existing de- Names based on CIA principals were used for countermeasure and No discussion
fense solutions. classification of routing attacks and possible about RPL attacks.
counter measures.
[26] 2012-2017 Focus on RPL improvement Survey address the RPL protocols enhance- Not discussed attacks/defense classi-
on basis of mobility, security ment considering security, mobility and opti- fication, impact analysis and research
and optimization. mization gaps.
[27] 2011-2018 Routing Attacks and its Proposed a classification of routing attacks on Not discussed any RPL attack
Mitigation in RPL-based RPL specifics and WSN inherited, Issues and datasets and practical implementa-
IoT Networks. Research Challenges. tion.
[28] 2011-2019 Security aspects of RPL- Extended attack taxonomy based on traffic, Not consider the attacks impact anal-
based routing in 6LoWPAN resources and topology and defense taxonomy ysis and No discussion about simula-
network in IoT focusing on secure protocol and IDS. Open tion tools, testbed, attack datasets
Research Issues and Challenges along with
cross layer defense solution for RPL.
[29] 2011-2019 Securing RPL from Specific Provides discussion for defense solution for Not focused on attacks classification
routing attacks in IoT version and rank attack in RPL-based IoT as well as future research goals.
network with minor impact analysis.
[30] 2013-2020 Focusing on building Intru- Design requirement, best practices and gaps to No consideration for attack and de-
sion Detection System for build the IDS system for RPL. IDS requirement fense taxonomy as well as impact of
Securing RPL from routing and guidelines for robust IDS. routing attacks.
attacks.
[31] 2011-2020 Reviewing Intrusion Detec- Detailed discussion about IDS for RPL, routing Not considered the RPL-based rout-
tion System for RPL-based attack impact analysis, brief about simulator ing attacks datasets and testbed fa-
routing attacks in 6Low- tools and research directions. cility for RPL .
PAN network.
[33] 2011-2020 RPL-based routing attacks Classify the RPL-based routing attacks based No discussion about the attack
and its mitigation focusing on RPL control messages (DAO, DIS, DIO, dataset and testbed for RPL.
RPL control messages. DAO-ACK) and mitigation according to de-
fense method
[34] 2016-2021 Focusing Machine and Detailed discussion about future research di- Not considered the conventional se-
Deep Learning Based rection of RPL along with critical analysis curity solution of RPL, critical analy-
defense solution for RPL- of existing study. Very short compassion for sis of existing routing attack datasets
based routing attacks in existing RPL attacks dataset. and testbeds.
6LoWPAN.
[35] 2013-2023 RPL-based routing Attacks Taxonomy for classification of RPL attacks Not performed impact of RPL at-
and Mitigation for IoT net- based in attack vector and launching methods. tacks, no discussion about the RPL-
work. attack dataset and testbeds.
[36] 2011-2024 Detection approach for Classification of attack and methods for safe- Not considered the RPL routing at-
RPL-based routing attacks guarding the RPL for routing attacks. tacks datasets, testbeds and attack
in IoT networks. impact analysis.
This 2011-2024 Focusing RPL Attacks and Proposed a Novel Taxonomy for RPL attacks We are not considered the demon-
Survey Defense solutions with and defense classification also detailed impact stration of RPL attacks and mitiga-
critical analysis, Detailed analysis of each attack. Detailed investiga- tion.
analysis of routing attacks tion on RPL-based routing attack datasets,
datasets, RPL testbeds, simulator tools for building RPL-based IoT
simulator tools, future network and discussion of real time testbed for
research directions. experimental study of RPL.
Table 3
Routing Attack Vertical for RPL
This study included statistical analysis and research challenges. Table 2 displays existing surveys on RPL-based
routing attacks and defense mechanisms from 2011 to 2024. The table illustrates several shortcomings of this research
domain and inspires our efforts, which led to a novel taxonomy for routing attacks and defense mechanisms for RPL.
Our research introduces novel ideas not covered in previous studies, such as RPL-specific simulators, datasets, and
testbeds.
• What are the routing attacks covered by researchers in the literature so far?
• What parameters are affected by routing attacks, and how do they affect routing decisions?
• What are the various defense mechanisms developed for securing RPL?
• What parameters are used to assess the performance of the defense mechanisms?
• What simulators, datasets, and testbeds are available for RPL research work, and to what extent can researchers
use them?
• What are the routing attacks that researchers have not addressed, and hence the new defense mechanisms that
need to be developed?
Placing such a broad range of attacks into existing taxonomies is challenging and may limit the clear understanding of
RPL security for new researchers. To address this issue, we have proposed a new taxonomy that focuses on the nature
of the attack, such as whether it exploits rank or the local repair mechanism of RPL. Additional categories are created
based on whether the attack involves DoS, flooding, replay, packet dropping, or eavesdropping. Furthermore, we have
introduced separate categories for hybrid attacks, identity-related attacks, storing mode attacks, and miscellaneous
attacks. We believe this taxonomy better reflects the actual nature of these attacks and can help researchers advance
their work in a clearer and more structured manner.
Subsections 3.1 to 3.12 provide an overview of these routing attacks. However, we encourage the reader to refer
to the papers cited under each attack for a detailed discussion of the implementation of RPL attacks. Algahtani [37] et
al. lays down detailed steps of procedure to implement RPL-based routing attacks in Contiki-NG.
Version Number Repair Attack Storing Mode Attack Routing Table Overload
Sink-Clone
Rank Manipulation and
Drop Delay Cross Layer Attack Hybrid Attack
Copycat
Neighbour
DIO Suppression
Novel Partitoning
Routing Choice Intrusion Replay Attack Miscellaneous
DAO Induction
DAO Insider
Wormhole
! !
',2>VRXUFH,3 @ 6
1RGH GURSHG '$2
PHVVDJH DQG VHQG IDNH ',2>VRXUFH,3 @
'$2 $&. WR QRGH 1RQ VSRRIHG FRS\FDW
',2>VRXUFH,3 ^ `@
6SRRIHG FRS\FDW
root node. The primary goal is to attract the legitimate nodes present in a network and their traffic to reduce or
degrade the network performance.
• Increase Rank: Le et al. [40] outlined an attack on the routing operation where a malicious node deliberately
publishes a higher rank with the worst routing metrics, compelling the adjacent nodes to choose a different node
as the parent. The intent is to disrupt the routing topology and cause a significant end-to-end delay.
• Rank Attack Using Objective Function: Rehman et al. [41] proposed a rank attack where a hostile node advertises
a lower rank than its actual rank and the minimal routing metric based on ETX among observed routing metrics
of neighbors. This attack is more severe as it reduces the packet delivery ratio.
• Energy Depletion: Pu et al. [53] presented an Energy Depletion attack where several malicious nodes generate
packets and broadcast them in the forwarding path toward the legitimate node. This will increase legitimate
nodes’ energy consumption and result in service denial. The author has proposed a misbehavior detection
technique to detect this attack. Fig. 4b explains the working of energy depletion attack where node 5 flood
the packet to deplete the energy of node 1.
• Blackhole: Raza et al. [54] introduced a blackhole attack where a hostile node relinquishes all the packets which
are supposed to be forwarded in the network. This isolates a node or set of nodes from the network and decreases
the packet delivery ratio.
• Induced Blackhole: Chen et al. [55] proposed an induced blackhole attack where malicious nodes continuously
drop all the targeted router packets without modifying the legitimate router’s internal logic. The malicious nodes
use a jammer to launch or stop this attack which blocks outgoing routing updates of neighbors without modifying
the incoming packet or MAC-layer ACK frames of a targeted router.
• Coordinated Blackhole: Essaadi et al. [56] proposed a coordinated blackhole attack, a type of binary blackhole
attack [57] where a network of bad actors collaborates to carry out a single attack. They also proposed a Hop-
Count Reachability (HCR) based mitigation mechanism against the attack.
• Dropped DAO: Sheibani et al. [58] proposed an attack where a malicious node relinquishes the DAO message
received from a legitimate node and reverts with a counterfeit DAO Acknowledgment (DAO-ACK) to prevent
the creation of new downward routes. This attack drops all the downward packets, reducing the packet delivery
ratio. The Fig. 4c show the Dropped DAO attack where node 1 drop the DAO message received from node 5
and send fake DAO-ACK in response.
• Sinkhole: Wallgren et al. [19] described the Sinkhole attack where malicious nodes decrease their rank to attract
network traffic. The network traffic is altered or dropped after a malicious node becomes the network’s preferred
parent.
• Grayhole/Selective Forwarding (SF): Wallgren et al. [19] discussed a grayhole attack, also known as the selective
forwarding attack, where a malicious node sends filtered RPL control packets and relinquishes the remaining
packets in a network to distort the routing path.
• Sybil attack: Zhang et al. [59] proposed a sybil attack where malicious nodes use multiple logical identities for
the same network physical node. The authors also discussed three variations of sybil attack: SA-1 (limited to a
specific network range), SA-2 (distributed to network range), and SA-3 (distributed to network range with mobile
malicious node).
5 5
6 6
5 5
1RGH XVH GURS DQG GHOD\
SUREDELOLW\ WR VHQG SDFNHW
ZKLFK DIIHFW WKURXJKSXW
5 5
1RGH DGYHUWLVH ORZHU
UDQN &RQQHFW WR 6LQN 1RGH
5 5
5
5
• Traffic Analysis: Mayzaud et al. [22] discussed traffic analysis, where a malicious node analyzes traffic patterns
and characteristics to obtain routing information and identify parent/child relationships to provide a view of
network topology. The impact of this type of attack is determined by the node’s location. More traffic is inspected,
and more sensitive routing information is exposed the closer it is to the root node.
3.12. Miscellaneous
The miscellaneous attacks presented below have not been categorized, but they also exploit the RPL features to
launch routing attacks.
• Neighbor Attack: Le at al. [63] proposed a neighbor attack where a malicious node forwards any unmodified
DIO message in the network. When a valid node receives a DIO message, it assumes it may have a new neighbor
out of range. Although it may be beyond range, if the new node broadcasts a high rank, the genuine node chooses
to make it a preferred parent and changes the route. The network experiences a slight end-to-end latency due to
this kind of attack.
• Novel Partitioning Attack: Sahay et al. [64] proposed a novel partitioning attack where a hostile node skips the
route registration process. This can be done by cutting the parent selection step at the node joining or blocking
the DAO output whenever a new DIO message is received. This will create segregation of legitimate nodes from
DODAG and reduce the packet delivery rate of the sink node.
Table 4
Impact Assessment of state-of-the-art Routing Attacks
Impact Assessment
C: Confidentiality I: Integrity A: Availability EC: Energy Consumption FR: Fake Routes/Falsification of Routes
RL: Routing Loop UR: Un-optimized Route TF: Traffic Flow/Congestion PDR: Packet Delivery Ratio CMO: Control Message
Overhead E2ED : End-to-End Delay SD : Sub-optimal DODAG L: Low M: Mid H: High Y: Yes N: No
• DAO Induction: Baghani et al. [65] proposed a DAO induction attack where a malicious node exploits the DIO
message and regularly increments the DAO Trigger Sequence Number (DTSN) to create the crafted control
message, causing nodes in the malicious sub-DODAG to send redundant control messages. Eventually, it will
increase the packet loss rate and end-to-end latency.
• Wormhole: Wallgren et al. [19] discussed a wormhole attack where two or more malicious nodes forge an out-of-
bound connection called a tunnel over a wired or wireless medium to forward legitimate network traffic without
the involvement of a border router. This will create an optimized path in the network.
The discussion above has provided an overview of the routing attacks described in the attack taxonomy. When an
attacker or malicious node launches an attack on a network, it affects various parameters, degrading the performance.
The impact on various parameters has been investigated as presented in Table 4 and real-life scenarios and impact of
Table 5
Real-life scenarios and impact of some prominent RPL attacks
Attack Name Real-life Scenario Impact
Blackhole Attack In a healthcare IoT system, an attacking node (device) may advertise an optimum routing Time sensitive patients’
of the patient monitoring data that is to be forwarded via the malicious node. It will receive data loss and fatal delay in
all the critical patient information without forwarding them further. Due to this, there could emergency.
be loss of critical information for diagnosis, leading to incomplete information when any
emergency case arises.
Sybil Attack In automated IoT enabled factory, a malicious node can acquire different fake identities which Resource exhaustion and
overwhelms the other nodes. This can lead to incorrect routing decision and impede real-time delay in data transmission.
surveillance of machinery.
Rank Attack In a post disaster communication network, a malicious node can advertise its rank to be lower Inefficiency in response to
than the actual. This can result in routing of critical data through it, eventually delaying the emergencies.
alerts for emergency events.
Version Number In a RPL-based energy monitoring system of a smart grid, an attacker alters the version Higher control message
Attack number of DODAG. This will rebuild the DODAG routing tables, resulting in network overhead due to topology
instability and delays in the reporting of energy consumption data. changes, resulting in
downtime in service.
DAO Suppression In a smart robotic logistic IoT network, a malicious node can delay forwarding of DAO Inconsistency in routing up-
Attack messages. This hinders the timely routing updates of the sensor nodes data causing delays dates and performance lag
in real-time inventory tracking for logistic operations. in IIoT.
DIS Flood Attack In a wildlife monitoring IoT network, a malicious node can continuously send the DIS Energy depletion and loss of
messages, overwhelming the tracking devices. This causes energy depletion of devices used crucial tracking data.
for tracking wildlife.
Dropped DAO At- A Dropped DAO attack might prevent the node from forwarding the messages of the DAO, Data loss, command and
tack which are very crucial to be sure of bidirectional routes from the root to the nodes. This control failure, and energy
could put people in unsafe situations and even cause loses in maintenance and money. wastage.
Routing Table Fal- In a smart agriculture setup, nodes monitor soil moisture, temperature, and humidity Data disruption, network in-
sification Attack throughout a vast farm. In this setup, an attacker may advertise false routing information stability, energy drain, DoS.
in the form of a fake shorter path to the root, pretend to be a root, and attract traffic
and divert traffic to non-existent nodes or loops. Consequently, legitimate nodes update the
routing tables based on such false information thinking that the compromised node is a
shortest path to the root, which may be a health hazard to the crops, bring about economic
losses, and face maintenance challenge.
some prominent RPL attacks are explained in Table 5. They include the nature of the attack (e.g., an insider or outsider
DIO Flooding
Sinkhole 6.1%
Multicast DIS Flooding
1.0%
6.1%
Decrease Rank
Version Number
1.9%
6.1%
Wormhole
Routing Table Falsfication
2.3%
5.8%
Dropped DAO DIO Suppression
3.2% 5.2%
Unicast DIS Flooding Global Repair
3.5% 5.2%
Sybil Copycat
3.5% 4.8%
Network Partitioning Attack Replay/Neighbour
3.5% 4.8%
Hatchetman Local Repair
3.5% 4.5%
node launching the attack), the type of attack (active or passive), the attacking node (e.g., storing or non-storing node),
and the effect on confidentiality, integrity, and availability and the impact on various parameters resource consumption,
routing decision, performance metrics and isolation of nodes. The overall impact has been classified as Low, Mid, and
High. We have also perform impact analysis of individual attacks which helps the researchers while designing accurate
and efficient defense solutions for identifying attacks. The cumulative impact of each attack is presented in Fig. 7 by
analyzing the level of each of the parameters affected. The observation drawn from the figure that the most disruptive
attacks on RPL are Version Number and the least disruptive is Increase Rank.
Table 6
RPL Specification Based Defense Mechanism for RPL-based Routing Attacks
Ref Year Scope Attack Focused Methods/Algorithm Performance Assessment
D C M P1 P2 P3 P4 P5
[75] 2016 ✓ ✕ ✓ Rank, Sinkhole, Local Re- Semi-auto Profiling Technique L - H N L
pair, DIS Flooding
[51] 2018 ✕ ✕ ✓ DAO Insider Restrict the number of Forwarded DAO by parent and destination H - - N H
[66] 2018 ✓ ✕ ✕ Rank Attack Encryption of DAO Massage and Rank Rule L - H Y H
[72] 2019 ✕ ✕ ✓ Version Number Elimination of VN updates and Shield to Analyzing DIO Message L Y H N L
[76] 2020 ✓ ✓ ✓ Sybil, Wormhole Highest Rank Common Ancestor L Y H N L
[77] 2020 ✓ ✕ ✕ Sinkhole Node Rating and Ranking Mechanism and Average Packet - - H N -
Transmission RREQ
[67] 2020 ✕ ✕ ✓ DAO Insider SecRPL1 - Restrict the number of Forwarded DAO per Child and H - - N H
SecRPL2 by specific node
[68] 2020 ✓ ✕ ✓ DIS Flooding RPL Constant - Safe DIS Transmission Interval and Max Permit- L - - Y L
ted DIS Request
[45] 2021 ✕ ✕ ✓ Multicast DIS Flooding Response Delay and Timer Readjustment, Maximum Response L - - Y L
Code inspired by Multi-cast Listener Queries
[78] 2021 ✕ ✕ ✓ Divide and Conquer Threshold of Minimum Rank and Maximum Rank L - H N L
[69] 2021 ✓ ✕ ✓ DIS Flooding Safe DIS Communication Interval, Max Permitted DIS Request, L - - Y L
Remaining Energy Level of Sensors
[64] 2021 ✕ ✕ ✓ Novel Partitioning Attack Route Registration Process and DAO Acknowledgment L - - - -
[65] 2021 ✓ ✕ ✓ DAO Induction Monitoring DTSN update at Root N Y H N -
[79] 2022 ✕ ✕ ✓ Worst Parent Selection Optimal Parent Set during Topological Construction Phase L - - N L
[38] 2022 ✓ ✕ ✕ Worst Parent Selection NMapper compare the rank of parent with neighbors M - H N -
[80] 2022 ✓ ✕ ✓ Rank Attack Echelon Metric Based Objective Function L Y H N L
[70] 2022 ✓ ✕ ✓ Version Number Collaborative Verification of DIO L Y H N L
[73] 2022 ✓ ✕ ✓ Rank attack Non cryptographic hash L Y H N L
[81] 2022 ✓ ✕ ✓ Rank attack Rate limiting of DIO L Y H N L
[82] 2022 ✓ ✕ ✓ Spam DIS Number of incoming DIS - Y H N L
[83] 2023 ✓ ✕ ✓ Dropped DAO Challenge Response Pair based Authentication of DAO-ACK L Y H Y M
multi-hop network.
Medjek et al. [45] proposed a novel Multicast DIS (M-DIS) attack and examined its impact on control message
overhead and power consumption in static and dynamic networks. RPL-MRC is a proposed defense mechanism that
avoids multicast DIS messages by introducing the maximum response code (MRC) field in RPL DIO messages. A
response delay mechanism is added to the dis-input function, and a timer readjustment mechanism is added to the
new DIO interval function in the proposed mitigation scheme. The proposed defense mechanism reduces energy
consumption and control message overheads significantly.
Alsukayti et al. [70] proposed CDRPL, a collaborative and distributed security mechanism for the detection and
mitigation of version number attacks in RPL. The proposed scheme ensures quick and accurate attack detection by
maintaining performance parameters such as network stability, overhead, and energy consumption. The CDRPL has a
lightweight collaborative verification mechanism that allows nodes to collaborate to maintain the legitimacy of received
DIO messages and ensure the RPL network global repair mechanism accepts only legitimate VN updates. The packet
delivery ratio, network stability, response latency, and accuracy are used to assess performance. In terms of network
overhead and power consumption, CDRPL outperforms the existing SRPL-RP [71], RPL + Shield [72], but it suffers
from control message overhead.
Nandhini et al. [73] proposed a lightweight rank attack detection and isolation mechanism known as RAD against
internal rank attacks. The RAD (Rank attack detection) mechanism used non-cryptographic hash values to prevent rank
attacks while maintaining control message integrity. The proposed mechanism modifies and integrates rank, parent
rank, and calculated hash values in DAO messages. These values are compared to the values stored in the information
table upon receiving DAO messages by the root node; if a mismatch occurs, an alarm is generated. The average packet
delivery ratio, control packet overhead, and delay are used to assess performance. When compared to SRPL-RP [71],
LEADER [74], and SBIDS [66], this approach achieves 96% accuracy, and DAO sampling technique is used to improve
the accuracy as well as reduce the energy consumption by 40%.
Nandhini et al. [81] proposed enhanced rank attack detection (E-RAD) mechanism for early detection and isolation
of rank in an RPL network. The proposed E-RAD is based on limiting the rate of DIO control message generation and
solicitation of DIS control messages to isolate rank attacker nodes. The rate-limiting trickle algorithm concept, where
each node maintains the DIO counter and its trickle timer, is used to measure the consistency of DIO messages. This
method also used a non-cryptographic hash value and rank to check for inconsistencies in DAO messages to identify
malicious nodes. The performance of the system is measured in terms of packet delivery ratio, energy consumption,
and control message overhead. E-RAD has higher accuracy than SRPL-RP [71] and SBIDS [66], both of which are
97.23% in grid-centered topology.
Alsirhani et al. [82] proposed a DIS Spam Attack Mitigation (DISAM) approach against the Spam DIS attack in
the RPL-Blockchain based Internet of things. The proposed DISAM approach runs on each node in the RPL network
distributively. The idea behind this approach is to keep track of the number of incoming DIS messages with no DAO
received from neighbor nodes wishing to join the DODAG, and if the count exceeds the defined threshold, it indicates
that there is a spam DIS request in the network. As a mitigation scheme, the victim nodes reject or discard all incoming
DIS messages for a set period of time. The performance is measured in energy consumption, and a high detection rate
is obtained in case of low DIS packet injection.
Goel et al. [83] proposed a challenge-response authentication based detection mechanism against the Dropped
Destination Advertisement attack (DDAO) in RPL-based IoT known as CRA-RPL. They modified the control message
and used the reserved field to implement a challenge-response pair mechanism to authenticate the DAO-ACK received
in response to the DAO message in the RPL non-storing mode. The Prime Sequence Codes generate the challenge-
response pairs based on the prime number used by nodes to identify the false DAO-ACK. The proposed approach is
lightweight in nature and achieves a high detection rate while effectively restoring network performance.
metric-based objective function RPL (EMBOF-RPL). The EMBOF-RPL improved the functionality of the DIO
message by including the Echelon metric within the DIO packet; additionally, it will aid in the routing decision.
The parent selection is based on the echelon metric, with a ten-second interval for each node that wishes to join the
DODAG. Isolation latency, detection accuracy, packet delivery ratio, end-to-end delay, memory overhead, and power
consumption are all used to assess performance. The proposed approach outperformed SVELTE [54], SecTrust [84],
and SBIDS [66].
Table 7
Intrusion Detection System Based defense Mechanism for RPL-based Routing Attacks
Ref Year Scope Attack Focused Methods/Algorithm Performance Assessment
D C M P1 P2 P3 P4 P5
[54] 2013 ✓ ✕ ✕ Spoofed, Selective Forward- 6Mapper-Network Graph Inconsistency Detection, Detect Fil- L - M N L
ing, Sinkhole tered Node, Finding Rank Inconsistency, and Mini-firewall
[89] 2016 ✓ ✕ ✓ Sinkhole Evidence Theory, and Ranking M - - N M
[90] 2017 ✓ ✕ ✓ Selective Forwarding, Sink- Trust Evaluator (Direct Trust Values), Neighbor, Clustered or - - H N -
hole, Version Number Tree based Trust dissemination
[91] 2017 ✓ ✕ ✕ Sinkhole, Selective Specification and Anomaly Agents Based IDS, Voting Mechanism H N - N -
Forwarding and Optimal Path Forest
[92] 2018 ✓ ✕ ✕ Multi-Stage Attack Node Level Module, Edge Router Module L Y - N L
[86] 2018 ✓ ✕ ✕ Version Number, Rank Identity Based Offline and Online Signature L Y - N L
[60] 2019 ✓ ✕ ✕ Sink-Clone 6LoWPAN Mapper and IDS Module-rankID M - H N M
[85] 2019 ✓ ✕ ✕ Packet Dropping Attack Packet Drop Probability - - H N -
[88] 2020 ✓ ✕ ✓ Worst Parent Selection, De- Forged Rank and Routing Metric Detector, Parent Child Relation M Y H N L
crease/Increase Rank, Rank Ship
Attack using OF
[93] 2020 ✓ ✕ ✓ Copycat Outlier Detection-Interquartile Range (IQR) M - H Y -
[94] 2020 ✓ ✕ ✕ Selective Forwarding, Rank Stochastic and Evolutionary Game Models H - H N H
Attack, Local Repair,
Neighbor Attack
[95] 2021 ✓ ✓ ✓ 13 Attacks* Software-Defined Networking L Y H N M
[96] 2021 ✓ ✕ ✕ RADAR Dataset Packet Sniffing Approach, Auto Regressive Integrated Moving L - H N -
Average
[97] 2023 ✓ ✓ ✕ Rank, Version Number Active Probing and Discrete Event Modeling L Y H N L
[98] 2023 ✓ ✕ ✕ Worst Parent, Increased Genetic Programming Tree based IDS L Y H N L
Version, Hello Flood,
Decreased Rank
[99] 2024 ✓ ✕ ✓ Sinkhole SHAP and Hidden Markov Model - Y H - L
claimed that the proposed approach has a 100% detection rate and a low overhead when compared to SVELTE [54].
Overall, the proposed method is lightweight, has a high detection rate, and is appropriate for resource-constrained
networks. A new algorithm will be combined with FORCE in the future to detect more attacks.
Raza et al. [54] proposed a real-time intrusion detection mechanism named SVELTE to detect spoofed or
altered, selective-forwarding, and sinkhole types of routing attacks. SVELTE is made up of two major components:
a 6LoWPAN mapper that is used to create RPL routing states and an IDS module that uses a hybrid approach
and is integrated with a mini-firewall to protect against global attacks. Network graph inconsistency, checking node
availability, and routing validity components are present in the IDS modules for detection purposes. The detection
rate and true positives were evaluated as performance parameters. The detection rate is 100% for some settings of
experiments and the reported true positive rate is 90% for some setting indicating the 10% false alarms in some
cases. SVELTE can be extended to detect wormhole attacks by extending the 6LoWPAN mapper with signal strength
information for each node, as well as Clone ID and Sybil attacks by adding location information that can be used to
build the network’s physical map.
Bostani et al.[91] proposed a real-time anomaly and specification agent-based IDS mechanism to detect Sinkhole
and selective forwarding attacks. The specification agent IDS (SA-IDS) sends information about potential malicious
nodes by analyzing input and output traffic to 6BR. An anomaly agent-based IDS (AA-IDS) uses a MapReduce-based
approach, runs on 6BR, and performs clustering based on an optimal path forest algorithm to detect anomalies. Based
on the local and global decisions of SA-IDS and AA-IDS, the root node makes the final decision about anomalies
based on the voting mechanism. The performance was evaluated in terms of true positive rate, false positive rate, and
accuracy. The proposed hybrid approach can be deployed in the smart city environment.
Arshad et al. [92] proposed a Collaborative Intrusion Detection (COLIDE). In this effective signature-based IDS,
intruders are detected by collaborating with sensor node devices and border node routers. The IDS has two major
components: node-level detection and edge router detection. A detection engine at the node level detects routing attack
attempts based on existing signatures. An edge router detection system consists of three components: an alert collector,
a correlation agent, and a detection agent. An alert collector gathers alerts from node-level monitoring components by
communicating with IoT devices. Correlation agents provide countermeasures by correlating malicious events at the
network and system levels as monitored by node-level monitors. The detection agent used an anomaly-based approach
to detect attacks based on alerts collected and correlated in the IDS. The performance metrics are energy and processing
overhead.
Mirshahjafri et al. [60] proposed a Sink-Clone hybrid attack, a combination of the Sinkhole and Clone ID attacks,
and a hybrid IDS to detect the attack. In the hybrid Sink-Clone attack, a group of malicious nodes with the same
identity displays the lowest routing cost and entices all adjacent nodes to forward their packets through them. To detect
a Sink-Clone attack, the proposed hybrid approach combines the SVELTE [54] and sinkhole detection approaches.
IDS consists of two components: 6LowPAN Mapper and IDS modules, which contain an additional rankID module to
detect Clone ID attacks. The proposed method reduces false positives while increasing the detection rate. The detection
rate is reported to be 100%, decreasing as the number of nodes increases.
Agiollo et al. [96] proposed a signature and anomaly-based intrusion detection system with a high attack detection
rate to detect 14 well-known RPL attacks using a packet sniffing approach. This work used the RADAR - Routing
attack dataset for RPL, which contains traces of 14 RPL attacks on 16 static scenarios. In this method, 11 features are
chosen for attack detection, an auto-regressive moving average model is used for anomaly detection, and a set of rules
is used to classify the attacks into one of 14 categories.
Violettas et al. [95] proposed an ASSET, a software-defined network-based intrusion detection system, to detect,
characterize, and mitigate 13 types of RPL attacks. ASSET comprises four specifications and three anomaly-based
mechanisms for detecting attacks and implementing various mitigation strategies. ASSET is a three-tiered architecture
that includes a data communication plane, a control plane, and an application plane. The data communication plane
includes an RPL protocol stack, cross-level configuration hooks, control packet statics, and node-level anomaly
detection. The control plane is in charge of communication statics. The application plane includes a graphical user
interface (GUI) for IDS visualization and configuration. ASSET’s performance demonstrates an adaptable intrusion
detection system with minimal communication overhead.
forwarding behavior to derive states, and then, based on the first phase, developing rules to detect attacks. The detection
accuracy, throughput, delay, normalized overhead, energy consumption, and packet loss are the performance metrics.
The deviation is used for compassion and produces the best results for less than 50 nodes network.
Ray et al. [97] proposed a novel attacker identification mechanism for version and rank attacks that employ the
concept of intelligent, active probing and detection via an IDS based on a Discrete Event System (DES). The proposed
IDS operates in a centralized manner, receiving input from leaf nodes and classifying traffic behavior as normal or attack
using active probing. The IDS is composed of three components: Packet Sniffer, which captures packets (both control
and data), RQST_RSP_HANDLER(), which extracts meaningful information about network events from packets; and
DES Diagnoser, which performs attacker identification based on event information. The proposed IDS performance is
evaluated using simulation and testbed experiments on the FIT-IoT LAB platform. The average energy consumption
is 14872mJ, while the accuracy of attacker detection is very high (99.1%).
Deveci et al. [98] proposed a lightweight IDS against the worst parent attack, hello flooding, decrease rank and
increase version number attack based on Genetic Programming (GP). The solution runs by central ID node which
collect and aggregate the network traffic periodically received from monitoring nodes in order to detect the attacks
which generate the malicious traffic. The main objective of this approach to optimize the detection accuracy and reduce
the communication overhead (energy and memory consumption ) of Intrusion Detection. The high detection accuracy
around 92.2% is achieved after 30% of generations.
Bhale et al. [99] proposed a hybrid IDS for detecting and mitigating sink hole attacks in RPL-based IoT networks.
The proposed EaHIDS approach consists of four phases:data collection, feature extraction, application of a lightweight
ML model to edge nodes, and blacklisting of malicious nodes. The SHAP approach is used to extract features, while
the Hidden Markov Model is used to detect anomalies. The proposed approach was evaluated on the Cooja simulation
environment, machine learning datasets such as IRAD, NLA, and FIT-IoT Testbed, and it showed high accuracy and
low energy consumption.
Table 8
Trust Based Defense Mechanism for RPL-based Routing Attacks
Ref Year Scope Attack Focused Methods/Algorithm Performance Assessment
D C M P1 P2 P3 P4 P5
[100] 2015 ✓ ✕ ✓ Sinkhole Watchdog, Reputation and Trust-Beta Distribution - - H Y -
[101] 2016 ✕ ✕ ✓ Blackhole Compute Trust for Optimal Routing Decision, Effective L - - N -
Feedback
[84] 2019 ✓ ✕ ✓ Rank Attack, Sybil Direct Trust and Recommended Trust L - H N -
[107] 2019 ✓ ✕ ✕ Sybil, DoS Trust Value and Average Received Signal Strength Indicator L Y - Y -
[108] 2021 ✓ ✕ ✓ Blackhole Trust on Forwarding behavior of Node and Trust Calculation L - H - L
on Controller
[102] 2021 ✓ ✕ ✕ Sinkhole, Blackhole, Rank Parent Change Control L - H N L
Reduction/Promotion,
Wormhole
[104] 2021 ✓ ✕ ✓ Sybil Geographical Location of Node and Trust based Parent L Y H Y M
Selection
[105] 2021 ✓ ✕ ✓ Blackhole Trust Value based on successful interaction between two N - - N L
nodes
[103] 2021 ✓ ✕ ✓ Sinkhole Random Forest and Subjective Logic L Y H N L
[109] 2022 ✓ ✕ ✓ Selective Forwarding Reputation based in Forwarding behavior of Node N Y - N L
[110] 2022 ✓ ✕ ✓ Selective Forwarding Self Trust on the basis of forwarding behavior of packets - Y H N L
[106] 2022 ✓ ✕ ✕ Sybil attack Trust Path Routing based in RSSI L - H N L
based on delay, packet delivery ratio, energy consumption, and honesty, have been used to detect attacks. Similarly,
the isolation of malicious nodes was performed using the proposed RFTrust model, with the help of RF in the case of
direct trust and SL in the case of indirect trust. The RF algorithm classified the nodes as either trusted or malicious. In
comparison to existing approaches SoS-RPL [77], INTI [100], InDRes [89], the proposed model is more efficient in
terms of false positive rate, false negative rate, and accuracy.
Bang et al. [104] proposed a novel decentralized architecture for mitigating Sybil attacks (SA-1, SA, and SA-3)
in the context of a smart home. The hybrid approach employed the concept of parent selection based on each node’s
trust value and geographical location. Malicious nodes are identified by the use of specially configured nodes known
as monitoring nodes, which monitor network traffic and store the data in trace tables. This approach outperforms the
existing approaches SecTrust [84] and LiDL [76] in terms of control message overhead, average power consumption,
packet delivery ratio, and accuracy. The proposed method achieved up to 100% accuracy. In the future, the functionality
of monitoring nodes will be expanded to mitigate multiple or hybrid attacks.
Patel et al. [105] proposed and implemented a lightweight trust-integrated RPL protocol (TRPL) against the
Blackhole attack. This approach calculates trust value based on successful interaction between two nodes and is used
in the RPL protocol parent selection process. The trust value is calculated on a regular basis for each node and is
embedded in the routing decision. TRPL also builds feedback chains between nodes to monitor node behavior. This
method detects and isolates the Blackhole attack while consuming no power or increasing network overhead. TRPL
met two objectives: first, high detection accuracy, and second, improved data delivery ratio. In the future, the TRPL
will be enhanced to detect selective forwarding attacks.
Kim et al. [106] proposed PITrust. This trust path routing mechanism uses a physical identification mechanism
based on RSSI and a centralized trust scheme to detect Sybil attacker nodes in an RPL network. The PITrust procedure
is divided into three steps: RSSI variance observation, RSSI pairwise distance computation (RPD), and path trust
based on a modified objective function. When the RSSI variance exceeds the predefined RSSI threshold, an alarm is
generated via DIO message for potential sybil attacker nodes. When nodes receive an alarm signal, they compute the
RPD, and, based on positive and negative values, they decide whether the node is honest or malicious. Finally, trust is
measured using the PITrust algorithm based on the trust parameter in the objective function. The performance metrics
are packet delivery ratio, detection latency, energy consumption, and communication overhead. In the future, a new
security scheme for coordinated cyber attacks on IoT networks will be developed.
feedback of packet exchange. The decision for attack detection and isolation is based on the direct and recommended
trust of neighbor nodes. Compared to MRHOF-RPL, the proposed routing protocol has a lower packet loss rate and a
higher detection rate. The simulation results are validated by real-world testbed experimentation in the context of the
smart home. SecTrust-RPL will be expanded in the future to mitigate colluding attacks.
Thulasiraman et al. [107] developed a mobile trust-based security architecture to choose a better routing path
against Sybil identity and denial of service attacks. The modified rank computation for parent selection based on
bestneighborValue is used in this approach. To measure node behavior, the bestneighborValue is calculated from the
normalized objective function, trust value defined as 1 for trusted node and 0 for untrusted node, and average receive
signal strength indicator. In an IoT network, the random waypoint model is used to create a mobile environment. The
proposed approach outperforms all others in terms of PDR and control overhead. In the future, the architecture will be
evaluated for energy consumption and expanded to accommodate a greater number of mobile nodes.
Hassan et al. [108] proposed CTrustRPL, a trust-based defense mechanism against Blackhole attacks. The proposed
method computed the trust value based on node forwarding behavior at the controller node in order to save node storage
and energy. The controller layer is also in charge of trust aggregation, including rating and updating. The concept
of subjective logic was used in the trust value, which is an opinion about a node in terms of belief, disbelief, and
uncertainty. Packet loss rate and forwarding delay are two quality parameters used in trust composition and calculation.
This approach outperforms Sec-Trust [84] in terms of energy efficiency, detection time, packet loss rate, and storage
overhead.
Patel et al. [109] integrate a trust framework with RPL to detect and isolate a selective forwarding attack. The trust
framework is based on node reputation, which describes each node forwarding behavior. Essentially, the reputation is
calculated in terms of packet loss, taking into account both actual and normal packet loss. The RPL parent selection
process is altered based on node reputation. Throughput, energy consumption, and packet loss rate are used to evaluate
performance. Lower packet loss and energy consumption were achieved compared to the standard RPL protocol, which
uses MRHOF as the objective function. The proposed reputation system performance will be tested in the future for
larger networks with lower memory overhead.
Jiang et al. [110] implements a variety of advanced selective forwarding attacks, including protocol-based attacks,
packet forwarding attacks, and bad-mouthing attacks. Furthermore, a lightweight centralized trust model combines the
self-trust value to reflect the trustworthiness of the node in terms of packet forwarding behavior. This approach consists
of three modules: detection, notification, and isolation. The detection module is responsible for analyzing trust values.
The notification module encapsulates information and DIO messages and sends notifications to all nodes. The isolation
module allows child nodes to re-select their parents in order to exclude malicious ones based on DIO message responses.
Using ICMPv6 control packets, the author proposed a novel anomaly report mechanism for malicious node information.
The proposed method achieved the highest detection accuracy while consuming the least amount of energy.
measures.
Mehbodniya et al. [113] used supervised machine learning approaches such as Random Forest (RF), Naive Bayes
(NB), and Logistic Regression (LR) to detect fake identity attacks, also known as sybil, in an IoT sensor network.
The detection techniques consider the node’s packet delivery rates at the time of attack detection. When an attack is
detected, the radio transmission (TX) and radio reception (RX) for packet sending and receiving for each node are used
as features for the intrusion detection process, and an alarm alert is sent to the user. The NB algorithm has the highest
accuracy of 92.14%, while LR has the lowest accuracy of 89.12%.
Prakash et al. [114] proposed a novel optimized voting ensemble classifier for improving ANIDS performance
on the RPL-NIDDS17 dataset of an RPL-based IoT network. The SMOTE technique is used to balance the dataset.
The hybrid approach is used for feature selection based on simulated annealing and Salp Swarm Optimization to
select the best feature in the dataset. Ensemble machine learning techniques such as Decision tree (DT), K-nearest
neighbor (KNN), Logistic Regression (LR), Support Vector Machine (SVM), and Deep Learning classifiers such as
Bi-directional Long Shot Term Memory (Bi-LSTM) based voting classifier are designed for attack detection. The
accuracy (94.4%), average false negative rate (3.6%), and attack detection rate (97.7%) of the ensemble classifier are
the performance parameters that are used to evaluate its performance.
Osman et al. [115] proposed an Ensemble Learning-based intrusion detection system (IDS) for detecting DIS
flooding, decreased rank, and version number in an RPL network. In his approach, the author used the stacking of
different machine learning with optimal feature selection based on genetic algorithms (GA) to achieve remarkable
accuracy in attack detection. The authors created the RPL-ELIDS dataset, which consists of samples of RPL internal
attacks such as decrease rank, version number, and DIS flooding compiled on cooja under the contiki operating system.
The proposed ELG-IDS achieves a high detection rate and accuracy for single-model classification and an average for
multi-model classification. In the future, dynamic IoT network scenarios will be used to evaluate the ELG-IDS model.
Paganraj et al. [116] proposed DAIR-MLT approach uses machine learning algorithms to detect and avoid RPL-
based routing attacks on IoT. The author generated the normal and attack samples of rank, version, and flooding
attacks, and created the dataset named DA_IoT_Routing_Normal and DA_IoT_Routing_Attack. The network traces
were processed using LR, RF, DT, NB, and KNN, with RF outperforming the other methods in terms of accuracy.
Once the attacker node is identified, it is moved to the trash list, and any future messages from that node are ignored.
The proposed method greatly improves packet delivery ratio, throughput, network lifetime, and energy consumption.
Table 9
Machine Intelligence Based Defense Mechanism for RPL-based Routing Attacks
Ref Year Scope Attack Focused ML/DL Model Evalution Metrics
D C M M1 M2 M3 M4 M5
[117] 2018 ✓ ✕ ✕ IRAD Dataset Multi Layer Perceptron, Naive Bayes and Se- 96.30 95.00 96.70 94.30 -
quential model
[111] 2020 ✓ ✕ ✕ Sybil, Blackhole, Rank, Random Forest and Multi-Layer Perceptron 87.08 - - - -
Version Number
[118] 2021 ✓ ✕ ✕ Clone ID Sparse Auto Encoding and Deep Neural Network 99.65 - - 99.65 2.65
[112] 2021 ✓ ✕ ✕ Version Number Light Gradient Boosting ML 99.60 99.0 99.60 99.30 140.20
[119] 2021 ✓ ✕ ✕ Version Number, Hello Hierarchical Semantic and Group Method of 99.50 100 100 99.20 1.52
Flood Data Handling Neural Network
[120] 2021 ✓ ✕ ✕ Decrease Rank Random Forest Classifier and Artificial Neural 97.14 97.03 97.01 97.00 -
Network
[121] 2021 ✓ ✕ ✕ Decrease/Increase Artificial Neural Network with Cross Validation 100 100 100 100 -
Rank, Hello Flood
[122] 2021 ✓ ✕ ✕ Worst Parent Selection, GAN, LSTM and Feed Forward Neural Network 91.88 99.00 81.00 85.00 -
Increase Rank, Decrease
Rank
[123] 2021 ✓ ✓ ✕ IRAD Dataset Generative Adversarial Network-Classifier (GAN- 91.00 93.00 92.00 92.00 -
C) and Support Vector Machine
[113] 2021 ✓ ✕ ✕ Sybil Attack Naive-Bayes, Random Forest, Logistic Regres- 92.14 - - - -
sion
[114] 2022 ✓ ✕ ✕ RPL-NIDDS17 Dataset Ensemble Voting Classifier 96.40 95.26 - 96.45 -
[124] 2022 ✓ ✕ ✕ IRAD Dataset Deep Learning based Rarly Stage Detection 98.85 97.50 98.33 97.01 -
[125] 2023 ✓ ✕ ✕ Sybil attack Federated Learning and Dynamic Trust Factor 96.00 - 100 97.00 -
[126] 2023 ✓ ✕ ✕ Rank, DIS, Wormhole Supervised Deep Artificial Neural Network and 95.00 95.00 82.00 87.00 -
Semi-supervised Deep Autoencoder
[115] 2024 ✓ ✕ ✕ DIS, Decrease Rank and Ensemble Learning with Genetic Algorithm 99.03 99.50 99.50 99.50 -
Version Number
[127] 2024 ✓ ✕ ✕ RADAR Dataset Online Ensemble Learning with Drift Detection 97.67 98.55 96.67 97.93 -
[116] 2024 ✓ ✕ ✓ Decrease Rank, Version Random Forest Classifier - - - - -
Number, Flooding
GMDH algorithm and node information. In the knowledge phase, the dataset and training are processed in order to
build an IDS. Finally, during the execution phase, a GMDH-based neural network is designed to avoid the attack. The
proposed model was 99.9% accurate. In the future, the author will create a deep long short-term memory-based model
to improve detection.
Sharma et al. [121] proposed a supervised learning model based on an artificial neural network (ANN) for detecting
decrease rank, hello flood, and increase version number attacks. Pre-processing, feature extraction, and normalization
have been performed on the first routing attack dataset of three attacks. The proposed ANN model divides the dataset
into benign and malicious classes, and the hidden layer in the neural network is identified by averaging the number of
units in the input and output layers. Parameter tuning is done to optimize performance. Finally, ten cross-validation is
performed to ensure accuracy. The recall, precision, and F1-score are used to assess performance.
Sahay et al. [122] proposed a holistic framework for predicting multiple types of RPL attacks in IoT LLNs using
Blockchain and deep learning technology. To secure the IoT LLN data, the packet captured (pacp) file is generated
from the IoT-LLN and stored in a private Blockchain-based smart contract. Two popular deep learning tools were
used to extract spatial and temporal features from captured data: Graph Convolution Neural Network (GCN) and
Long Short Term Memory (LSTM). The feedforward neural network divides the captured data into four categories
based on the inputs from GCN, LSTM, and the warning pulse generated by the smart contract: resource attack (p1),
topological attack (p2), traffic attack (p3), and normal state (pn). The proposed method for detecting specific attacks
and determining how to store the large amount of data generated by IoT LLN in the Blockchain.
Nayak et al. [123] proposed a deep learning-based Generative Adversarial Network-Classifier (GAN-C) to detect
routing attacks in the Industrial Internet of Things (IIoT). The GAN-C is a two-stage GAN and support vector machine
combination (SVM). The parallel learning methodology is used in this model to reduce the training time significantly.
The first stage GAN classifier, is a combination of two ANN models used to generate and detect adversaries, while the
second stage classifier is used to identify and classify attacks. The proposed model’s performance is evaluated using
the IRAD dataset.
Albishari et al. [124] proposed a novel scheme known as deep learning-based early-stage detection (DL-ESD) on
the IRAD dataset of IoT. The model performance is improved by selecting distinct features using Linear Discriminant
Analysis (LDA) and min-max scaling for feature normalization, and reduces training time with various deep learning
techniques (LR, KNN, SVM, NB, MLP). The proposed DL-ESD used the idea of binary classification with lightweight
deep learning techniques to classify the behavior of the IRAD dataset and MLP and achieved high accuracy during the
testing and training phase with low running time. The performance parameters are accuracy (98.85%), recall (98.33%),
precision (97.50%), and F1-score (97.01%).
Alghamdi et al. [125] proposed a framework for real-time wormhole detection in an IoT network using Dynamic
Trust Factor (DTF) and cascaded federated deep learning techniques (CNN and LSTM). The proposed approach
collects critical information concerning security and privacy from nodes through decentralized training. Once a local
model has been created, it is submitted to a federated learning aggregation agent. The global model is created while
considering the node’s identified security and privacy concerns. The global model assists individual nodes in analyzing
and detecting wormhole attacks with high accuracy. The DTF values are determined using the QoS and social trust
metrics, and they have complete knowledge of the trust associated with other nodes and are less than the defined
threshold than malicious nodes. The proposed framework achieves high detection accuracy while reducing resource
requirements and latency.
AL Sawafi et al.[126] proposed a hybrid approach based on supervised and semi-supervised deep learning concepts
for the classification of network traffic behavior in RPL-based IoT networks. The author created the IoTR-DS dataset,
which contains traces of three popular RPL-based attacks: Rank, DIS Flooding, and Wormhole. The proposed DL-
IDS (DAE-DANN) employs a hybrid model that includes the Deep Artificial Neural Network (DANN) as a supervised
model and the Deep Auto-encoder (DAE) as a semi-supervised model for attack classification on the proposed IoTR-
DS. The proposed model achieves high accuracy on IoTR-DS for both known attacks (pre-trained) and unknown attacks
(untrained).
Budania et al.[127] a deep learning-based anomaly detection mechanism for RPL attacks was proposed, utilizing
unsupervised ensemble learning. The proposed approach, OEAD (Online Ensemble-based Anomaly Detection),
creates an ensemble model using Autoencoder (AE), iForest (ASD, and NDKSWIN) techniques. The approach employs
initial model training, followed by fine tuning with a drift detector to identify significant changes in network traffic,
and model updating for real-time anomaly detection. The performance of the proposed approach is evaluated on the
RADAR dataset, which contains nine RPL attack samples, and the highest accuracy for Sybil attack is obtained.
– Robust AI Algorithms: The protection against the AI attack can be obtained by designing the new robust
AI algorithms which use hardening techniques to deceive themselves [132]. The hardening techniques can
be borrowed from other domains which prove great success against the attack, such as Address Space
Layout Randomization (ASLR). The popular organization DARPA works hard in this area and provides
Guaranteeing AI Robustness Against Deception (GARD) as a good example.
– Self-Supervised Learning: The future research will be conducted to build the self-supervised mechanism to
protect against AI attacks [133]. The self-supervised learning algorithms combine the power of supervised
and unsupervised learning to automatically build the label from the raw dataset, which can detect unknown
attacks efficiently. The self-supervised learning uses Generative Adversarial Network (GAN) to build
defensive AI approaches.
– Explainable AI: The Explainable AI is the key research area in the development solution for IoT security
[134]. The explainable AI helps to understand the complex process involved in machine learning algorithms
for human beings. The crucial aspects related to the trustworthiness of the dataset, machine learning
models, and the applied algorithm is answerable by the explainable AI. The explainable AI may be explored
to build the defense against the AI attack by understanding the black box nature of compromised machine
learning models.
Table 10
Threshold Based Defense Mechanism for RPL-based Routing Attacks
Ref Year Scope Attack Focused Methods/Algorithm Performance Assessment
D C M P1 P2 P3 P4 P5
[43] 2014 ✕ ✕ ✓ DAG Inconsistency Adaptive Threshold on Number of Trickle Timer Reset L - - N L
[141] 2015 ✕ ✕ ✓ DAG Inconsistency Dynamic Threshold on Network Characteristics for Trickle L - - N L
Timer Reset
[135] 2016 ✕ ✕ ✓ Blackhole Local Decision and Global Verification Process - - H N -
[48] 2018 ✕ ✕ ✓ DAO Inconsistency Dynamic Threshold Mechanism on Forwarding Error Packets L - - N L
[53] 2019 ✓ ✕ ✓ Energy Depletion Attack Misbehavior Aware Detection Scheme - - H N H
[136] 2019 ✓ ✕ ✓ Blackhole Suspect List and Threshold of Packet Count - - - N L
[137] 2019 ✓ ✕ ✓ Selective Forwarding DIS Message Sending Rate and Packet Send Interval L Y H N -
[138] 2020 ✓ ✓ ✓ Decrease Rank Black List, White List, Round Trip Time H - H N -
[71] 2020 ✓ ✕ ✓ Version Number, Rank At- Rank Threshold and Attack Status Table, Blacklist L - H N L
tack
[58] 2022 ✓ ✕ ✓ Dropped DAO Packet eavesdropping and Threshold Behaviors (Posi- L Y H N L
tive/Negative) of Nodes
[139] 2023 ✓ ✕ ✕ DIS Flooding DIO Response based Mitigation L - H N L
[140] 2023 ✓ ✕ ✓ Version Number Q-Learning Principle based on Q-Value of DIO Messages L Y H Y L
messages using the timestamp value; the second validates the legitimacy of the sending node by ID in the case of a
lower threshold value; and the third detects, mitigates, and isolates attacks using a blacklist table, a monitoring table,
and an alert function, the fourth and fifth define the conditions for defense against rank and version number attacks.
The performance is measured in terms of packet delivery ratio, energy consumption, control packet overhead, and
detection accuracy. SRPL-RP achieved a 98.48% packet delivery ratio and 98.30% detection accuracy.
Aljufair et al. [139] perform the impact assessment of DIS attack and proposed a mitigation mechanism based on
DIO response named as DIO_resp against the attack. The proposed solution based on the work of [68] and it restrict
the total number of send DIO from neighbours in the next trickle interval in response to DIS message send by a
node. Whenever this the transmission DIO exceeds the predefined threshold then mitigation scheme suppress the DIO
transmission. The performance of proposed mitigation technique is measured by energy consumption, traffic overhead
and packet delivery ratio.
Sharma et al. [140] proposed a Q-learning based detection mechanism known as QSec-RPL against the version
number attack in RPL-based static and mobile IoT network. The main idea was to used Q-Learning approach based in
discounting factor to detect the attack. The proposed approach run in every T second time, and it calculate the Q-value
of each node based on number of DIO received. Whenever the version number changes in DIO message received by
node, a patently is assigned as per Q-Learning strategy, and upper limit of Inter Quartile Range to detect the attacker
nodes. The proposed approach achieve the high detection accuracy while minimizing the overhead.
error packets using a dynamic threshold based on the attack pattern. Suppose the calculated dynamic threshold is less
than the number of received forwarding error packets. In that case, the child node is treated as malicious and detected
forwarding misbehavior increments by one at the record window end. The parent node isolates the malicious node
when forwarding misbehavior reaches a threshold. Performance evaluation is done using energy consumption, and
packet delivery ratio.
Pu et al. [53] proposed a misbehavior aware detection scheme (MAD) to protect resource-constrained networks
from a type of denial of service attack known as an energy depletion attack. To counter the energy depletion attack,
each node keeps a record of received packets from its children within a specified time window in the observation
table (OT), as well as the number of detected forwarding misbehavior of each neighbor node in the detection table
(DT). When the number of misbehaved packets exceeds a dynamically calculated threshold, the node is classified as
malicious and is isolated from the network. The packet delivery ratio, energy consumption, and detection rate are used
to assess performance. The proposed approach achieved an approximate packet delivery rate of 90% and a detection
rate of 85%.
Sheibani et al. [58] proposed a new attack known as the Dropped Destination Advertisement Object (DDAO). A
lightweight defense mechanism for attacks is also proposed, which monitors the DAO forwarding behavior of parent
nodes. The watchdog mechanism is used to monitor the behavior of the parent and, based on the negative packet
forwarding behavior of nodes while taking into account the attack detection threshold, the punishment isolates the
malicious nodes, and the forgiveness avoids false detection of malicious nodes. The evaluation metrics are true positive
rate, false positive rate, precision, accuracy, power consumption, and PDR. The proposed mechanism achieved a high
detection rate and increased the packet delivery ratio by up to 158% with little overhead.
4.6.1. Authentication
The following sections discuss authentication-based defense solutions.
Luangoudom et al. [142] proposed a novel intrusion detection scheme svBLOCK based on SVELTE [54] to detect
and mitigate blackhole attacks. The main idea was to reconstruct DODAG and validate nodes from malicious behavior,
as well as to provide authentication of control messages using encryption and isolate blackhole nodes from DODAG.
The proposed approach uses fewer resources to detect malicious nodes while maintaining a low false-positive rate
and a high detection rate. The true positive rate achieved is 98.5%, while the false negative rate is 3.7%. svBLOCK
outperforms SVELTE [54] in terms of packet delivery rate and power consumption. The proposed approach will be
extended in the future to detect wormhole attacks.
Karmakar et al. [74] proposed LEADER, a low overhead-based increase and decrease rank attack detection scheme
that uses a modified DODAG formation algorithm. The goal of this approach is to modify the DODAG construction
process to detect rank-based routing attacks launched during topology formation and maintenance. The proposed
approach modifies the DAO message and further ensures the integrity and authenticity of the exchanged messages
during RPL DODAG formation using a lightweight message authentication code known as HMAC-LOCHA. The
efficiency of the system is measured by energy consumption, false positive/negative rate, and detection accuracy. In
comparison to SBIDS [66], LEADER performed better.
4.6.2. Encryption
The following sections discuss encryption-based defense solutions.
Perry et al. [87] made two contributions. The first was an extension of VeRA [39] to mitigate a new rank attack
based on forgery and reply. The second was a topology authentication mechanism to mitigate routing topology attacks
such as version number, rank spoofing, and rank replay. The Trust Anchor Interconnection Loop (TRAIL) mechanism
was developed to inquire about actual path properties through attestation and message announcement. The main idea
here is to validate the upward path up to the root node using a round trip message or rank integrity recursively from the
validations of the upward path. TRAIL is an RPL protocol implementation on the RIOT platform that provides RPL
security and is deployed on the DES mesh testbed. The scheme’s performance is measured regarding network size and
message overhead.
Pu et al. [143] proposed liteSAD, a lightweight detection mechanism for sybil attacks that uses a Bloom filter
Table 11
Cryptography Based Defense Mechanism for RPL-based Routing Attacks
Ref Year Scope Attack Focused Methods/Algorithm Performance Assessment
D C M P1 P2 P3 P4 P5
[39] 2011 ✓ ✕ ✕ Version Number, Decrease Hash Chains of Rank and Version Number L - - - -
Rank
[87] 2016 ✓ ✕ ✕ Rank Replay/Spoofing Path Validation using Encryption Chain and Rank Attesta- L - - N L
tion using Bloom filter
[144] 2018 ✓ ✕ ✕ Rank, Sybil Remote Attestation and Piggybacks L Y - Y L
[142] 2020 ✓ ✕ ✓ Blackhole Authentication of Control Message and Isolation of Malicious L - H N H
node
[74] 2020 ✓ ✕ ✕ Decrease/Increase Rank Message Authentication Code (HMAC-LOCHA) L Y M N L
[143] 2022 ✓ ✕ ✕ Sybil Bloom Filter and Physical Unclonable Function L Y H N L
(BF) and a physical unclonable function (PUF). A DODAG root sends a BF-DAO packet to each node in the liteSAD
approach. Bloom filter array contains each node’s hash identifier and PUF response; when a node receives a DIS packet,
it verifies the identifier and PUF from the local copy, and mismatches are used to identify the malicious node. To avoid
DIS attacks, the author proposed a probabilistic approach to reduce DIO message broadcasting using textitproDIO. An
extensive simulation was used to evaluate the performance of liteSAD and proDIO, which provide better performance
in terms of detection latency, detection rate, and energy consumption.
4.6.3. Hashing
The following sections discuss hashing-based defense solutions.
Dvir et al. [39] proposed VeRA, a cryptographic mechanism for version number and rank authentication against
version number and rank attacks. With the help of a message authentication code, the VeRA security scheme computes
a version number hash chain and a rank hash chain. When an attacker node wants to increase the version number, it must
compute a pre-image of the version number’s last hash chain element, which is impossible because the cryptographic
hash function is one-way only. When a new node is created, all information is received via a DIO message. The
performance is measured in terms of overhead, calculated as the estimated time required to build the authentication
chain.
Conti et al. [144] proposed a secure and scalable version of the RPL routing protocol called SPLIT to overcome the
situation of rank and sybil attack. The proposed protocol is lightweight and employs remote attestation and piggyback
techniques for RPL control messages. The DAO control messages are used for remote attestation with additional
header field modifications, and additional overhead is avoided by piggybacking the messages. The attestation process
includes two main components verifier and prover. The verifier performs the following functions: initial joining, verify
trickle time, attestation, and report sending, whereas the prover performs the following functions: DODAG creation,
verification trickle time, attestation, report gathering, and verification. The proposed protocol consumes little energy,
making it suitable for resource-constrained networks such as IoT.
message for the newly joined node for each observation window, and the dispersity of each node is measured when the
observation window ends. Based on GINI, impurity detection, and attack mitigation have been performed. Compared
to [51, 135], the performance improves in several ways: detection rate, isolation delay, and power consumption. The
performance evaluation parameters are the rate of change of the DIO message and the energy consumption. A testbed
consisting of TelosB nodes will be designed and deployed in real networks in the future.
4.8. Miscellaneous
This subsection provides an overview of defense mechanisms that are not classified by the above categories.
4.8.3. Blockchain
Sahay et al. [151] designed a novel Blockchain-based framework for generating real-time alerts on RPL attacks such
as decreased rank, increase rank, and worst parent selection. The proposed approach is divided into three major phases:
DODAG advertisement, node joining (parent selection, route registration, and node advertisement), and DODAG
maintenance. The Blockchain Network (BCN) records LLN activity and forwards it to security analysts (SA) for
evaluating LLN behavior and detecting anomalies. The private Blockchain is built with the Ethereum client, and smart
contracts are written in Solidity.
7UXVW %DVHG
7KUHVKROG %DVHG
&U\SWRJUDSK\ %DVHG
6WDWLVWLFV %DVHG
0LVFHOODQHRXV %DVHG
Table 12
Performance Assessment of various performance metrics for RPL-based Defense Solutions
Accuracy (%)
Precision (%)
F1-Score (%)
Delay (ms)
Recall (%)
Reference
time, and approximately 10% nodes are selected as malicious nodes. Genetic programming-based Intrusion detection
mechanism is developed for addressing both attacks and their performance is measured in terms of accuracy, true
positives and false positives.
RPL Attack Dataset [155] is a publicly available dataset that contains multi class dataset containing traces of
multiple attacks. It contains traces of six attacks. For machine learning algorithms, the dataset provides two class
distribution, i.e., attack and non-attack. Three different types of topologies containing 25, 50 and 100 Tmote Sky
motes with 2, 4 and 10 malicious nodes. The dataset is developed from one hour simulation in Cooja, and the traffic is
captured by Radio logger plugin in the form of PCAP format. Finally, min-max scaling is used to scale the dataset in
interval of 0 to 1, and then seven class dataset is generated.
Routing Attack Dataset for RPL-based IoT [156] dataset is generated from simulation of 50 nodes for one hour
with variable attacker density (2, 6, 10, 20). It contains traffic Version Number, Worst Parent and Hello Flood attack.
Authors also have developed a neural network based cross layer intrusion detection system for RPL based attack and
a testbed on the dataset. The proposed model achieved the highest detection rate of 97.52%
IoT-DDoS [157] dataset is generated from three different DoS attacks including Selective Forwarding, Blackhole
and Flooding attack from the real-time dataset generation framework. 30 different types of Z1 motes were placed on
network to produce the network data of attacks for 96 hours. The sniffer is used to aggregate the traffic and send it
to the queue system which sends the traffic for feature selection on a defined time window. The feature selection unit
selects the feature of data link, network and application Layers one by one. After data labeling the dataset is generated
with 16 different features.
IOT Dataset[111] is a novel dataset generated from the power and network metrics of IoT attacks against the popular
objective functions OF0 and MRHOF of RPL protocol. RF and MLP machine learning algorithm are evaluated on this
dataset and showed the effective results.
RADAR[96] known as Routing Attack Dataset for RPL contains 14 different RPL attacks and generated from
network of 16 static IoT nodes. RADAR is produced from NetSim Simulator. 80 different simulation scenarios each of
1500 seconds simulation time were executed to extract traffic of 14 different attacks in the form of PACP files. A novel
attack detection mechanism named DETONAR is proposed for detecting of routing attacks. DETONAR is based on
packet sniffing approach which gives more than 80% detection accuracy for 10 attacks.
Intrusion Detection Component dataset (IDC), and Event Detection Component dataset (EDC) [158] are developed
by SERCOM Lab, University of Carthage in the Smart Hospital based IoT System. This dataset was developed with the
aim to design anomaly detection system. IDC dataset stores the network states in term of energy consumed by devices
such as radio transmission or reception and radio interfered energy. Similarly, EDC dataset stored the environmental
data such as light, temperature and humidity. Both the datasets contains the 1000 instance out of 200 instance used for
training purposes.
Clone ID dataset [118] is an identity based attack dataset developed from the CloneID attacks. This dataset was
developed with the aim for implementing an artificial intelligence framework for intrusion detection, and intrusion
protection system. The dataset is created from the simulation of variety of node such as 20, 50 and 100 and respective
dataset is labeled as cloneid_20n, cloneid_50n and cloneid_100n by considering the 10% nodes are malicious and
rest are benign nodes. There are two class of attack and normal in the dataset. SAE based encoders with Deep Neural
Network for were implemented and tested for attacks detection which achieved 99.65% accuracy on the cloneid_50n
dataset.
VNA Dataset[112] is developed for lightweight Version Number attack detection based on machine learning model
which achieved 99.6% accuracy. The raw dataset is created in the form of JavaScript Object Notation (JSON) format
from PCAP using the Wireshark tool. Subsequently, python script is used to extract the features from the JSON, and
after processing 17 features are chosen to be part of the dataset. The dataset contains the record from the malicious
node scenario of 1, 2 and 3 nodes out of 10 and 20 nodes obtained from simulation 10 minutes.
RPL Attack Dataset [159] created to test seven different machine learning algorithms namely K-Nearest Neighbors
(KNN), Random Forest (RF), Logistic Regression (LR), Decision Trees (DT), Gaussian Naive Bayes(GNB), Multilayer
Perceptron classifiers (MLP) and AdaBoost (AdB). The dataset has two label, i.e., attack and normal used to classify
the traces. The range of 60-90% for training and 40-10% for testing the machine learning the algorithms. Decision Tree
classifier achieved the highest precision and recall among other machine learning algorithms.
IoTR-DS [126] was proposed for hybrid intrusion detection algorithms which uses the concept of supervised and
semi-supervised learning to classify the RPl-based routing attacks. This dataset contain the attack sample of Rank,
DIS and Wormhole attack and an Hybrid IDS based approach for detection of those attack with 95% accuracy and 87%
Table 13
Dataset proposed for RPL-based Routing Attacks
Ref Year Dataset Type Attack Covered Records Attributes Samples Platform
[117] 2018 IRAD Standard Version Number, Decrease Rank and Hello Flood 9550795 18(17F+1L) 3395601 6155194 Cooja
[153] 2019 RPL-NIDDS17 Standard Clone ID, Local repair, Hello flooding, Selective 465318 22(20F+2L) 431981 33337 NetSim
forwarding, Sinkhole, Blackhole, Sybil
[154] 2019 IoT-RPL Synthetic Hello Flood Attack and Version Number - 50 - - Cooja
[155] 2019 2-Class / Multi-class Synthetic Decrease Rank, Sinkhole, Version Number, Hello 106192798 19(17F+2L) - - Cooja
Flood, Blackhole, Selective Forwarding, and
Multiclass
[156] 2020 Routing Attack Dataset for Standard Version Number, Worst Parent, Hello Flood - 27 - - Cooja
RPL-based IoT
[157] 2020 IoT-DDoS Synthetic Selective Forwarding, Blackhole and Flooding 4195537 16 - - Cooja
[111] 2020 IoT Dataset Synthetic Rank and Blackhole, Rank and Version, De- - 24(23F+1L) - - Cooja
creased Path Metric, and Rank and Sybil
[96] 2021 RADAR Standard Blackhole, Sinkhole, Selective Forwarding, Con- - 15 - - NetSim
tinuous Sinkhole, Sybil, Clone ID, Version Num-
ber, Wormhole, Replay, Rank, Worst Parent
Selection, DIS Flooding and Local Repair
[158] 2021 IDC and EDC Synthetic Rank, Version Number and Flooding - - - - Cooja
[118] 2021 cloneid_20n, cloneid_50n, Synthetic Clone ID 1492579, 20(19F+1L) - - Cooja
cloneid_100n 1576668,
1232862
[112] 2021 VNA Dataset Synthetic Version Number 1376231 17 884860 491371 Cooja
[159] 2021 RPL Attack Dataset Synthetic Sinkhole, Blackhole, Sybil, Selective Forwarding, 117510 23(21F+2L) 95342 22168 Netsim
DIS Flooding, DIO Suppression Attack
[126] 2023 IoTR-DS Synthetic DIS, Wormhole, Rank 380772 16(15F+1L) 337508 43224 Cooja
[160] 2023 ROUT-4-2023 Standard Blackhole, Decreased Rank, Flooding, Version 1639989 18(16F+2L) 579992 1059997 Cooja
Number
[115] 2024 RPL-ELIDS Synthetic Version Number, Decrease Rank, DIS Flooding, 1566352 18(17F+1L) 1219284 347068 Cooja
Multiclass
[116] 2024 DA_IoT_Routing Synthetic Hello Flood, Decrease Rank, Increase Version 9561 18(17F+1L) 4096 5465 Cooja
Number
[161] 2024 UOS_IOTSH_2024 Synthetic Sinkhole 1,771,880 14(13F+1L) 59381 1712499 Cooja
F1-Score. There are total twelve features which contains the details of data packet which was sent towards root such
has control message (count of DIS, DIO, DAO) , UDP messages and overall packet delivery ratio.
ROUT-4-2023 [160] is RPL attack dataset consist of four different types of RPL attacks named Flooding Attack,
Blackhole Attack, Decreased Rank Attack and DODAG Version Number. When the dataset is analyzed, total 18
features are there with normal sample around 67% and attacks sample is 33% which make it imbalanced. The primary
focus of this dataset is to build the efficient intrusion detection mechanism for RPL-based IoT network using artificial
intelligence techniques.
RPL-ELIDS [115] proposed a dataset consisting the attack sample of DIS flooding, Version Number and Decrease
Rank and proposed a ensemble learning based IDS which usage a genetic algorithm for feature selection. To develop
the dataset a variety of network topology is created with 10, 20 nodes with 1,2,3 as malicious node. Initially the number
of features in dataset was 113, after certain iterations for removing the redundant features, they are reduced to 17 with
1 class label. The proposed IDS system achieve 97.90% accuracy for the developed dataset.
UOS_IOTSH_2024 [161] is a comprehensive dataset developed at University of Sharjah for real time RPL-based
network on Cooja simulator focused on Sinkhole attack. This dataset consider the small and medium IoT network
scenario where single and dual attacker were deployed at various location of topology to gathered the network traffic.
There are total 13 features having information about source, destination and per second count of control message as
important feature.
Table 14
Testbed for RPL-based Internet of Things
Ref Testbed Access Type User Interface Number Programming OS Supported Hardware Nodes
Name of Node Language
[162] WISEBED Close Access GUI 550 - Contiki OS and TinyOS Mica2, MicaZ, SunSPOT
and TelosB
[163] LOG-a-TEC Partially Open Ac- Web - - Unix, Contiki, Custom VESNA 3.0 (ARM Cortex-
cess M3)
[164] FIT-IOT LAB Partially Open Ac- Web, REST and 2728 C Language RIOT, OpenWSN, FreeRTOS, M3,A8 and WSN430
cess CLI Static Contiki, TinyOS, Linux
and 117
Mobile
[165] NetSecIoT Open Access CLI - Python Raspberry Pi OS Image and RI- Raspberry Pi 2
OTS
[166] INDRIYA2 Partially Open Ac- GUI 140 C, Perl and TinyOS and Contiki SensorTag CC2650/
cess PHP CC1350 and TelosB
[167] TUTORNET - GUI 113 - - MicaZ, OpenMote and
TelosB
[168] CCI IOT - GUI - - Raspberry Pi ARM Cortex A53
Testbed
such as type of access, provides the detail about the registration process required to access the testbed, a user interface
to operate the testbed, the number of nodes and hardware motes deployed in the testbeds, programming language to
create our application in the testbed, operating system supported by the testbeds.
WISEBED [162] testbed project is supported by European Universities and Research Institutes. It is a large scale
wireless sensor network which is deployed at University of Lübeck. The Open Federation Alliance (OFA) defines web
services to connect with this federated testbed with the help of overlay network. The WISEBED can be viewed as as
global network of intelligent agents and human users connected together with wireless networks. The main aim is to
provide a wireless sensor network testbed which provides variety of interfaces, connect several hundred nodes, unified
algorithmic and software environment togther with support for mobility.
LOG-a-TEC[163] provides a diverse set of testbeds in various verticals such as air quality monitoring, photovoltaic
energy production forecasting, smart motor-home and new vertical in the area of Internet of Things using LR-WPAN
and LPWAN technologies such as 6LoWPAN and ultra wide band communication. The hardware platform used
is VESNA. VERSNA is developed by Sensor Lab using ARM Cortex-M3 core micro controller support multiple
frequency bands. Currently VESNA supports the Contki-NG of version 4.5 and accessed via LCSP protocol and
6LOWPAN using the login credentials. Various experiments that are available include 6LoWPAN statistics, game-
theoretical interference mitigation and over-the-air programming and dataset for LPWAN spectrum trace, UWB
localization and BLE fingerprints on receive signal strength on a web portal.
FIT IoT-LAB [164] is a large scale IoT testbed deployed at six different cities in France connected with REST
API and CLI support. The FIT IoT-LAB testbed has world wide user base of more than 5000 user and across
countries and till date more than 200 thousand of experiments were conducted on FIT IoT-LAB. It has a wide range
of features like open platform, open software and open tools and capabilities to support multi-radio, multi- platform,
multi-OS and multi-topology. In FIT IoT-LAB, a user can choose a specific hardware board with its own operating
system like CONTIKI-NG, RIOTS and Free RIOTS to develop firmware that can run on different physical topologies.
The architecture has three main components namely Open Node (ON) (a low power device), Control Node (CN)
(responsible for operation and choosing power source for Open Node) and Gateway (GW) connecting Open Node to
Control Node using serial ports using Linux based computers. Some use cases include visualization of WiFi traffic and
its impact assessment.
NetSecIoT [165] is an IoT testbed which supports 6LoWPAN protocol implemented in RIOT Operating System.
The main components of this testbed are Display Node (a http client), Gateway Node which scan the CoAP devices and
translate http request into CoAP to access the testbed, RIOT IoT Node, a constrained device implementing Netsec IoT
Protocol and a Non-Embedded IoT Node for running Raspberry Pi. To setup the testbed, three steps are needed: creation
of Raspbian image with 6LoWPAN support, setting up RIOT OS on running on top of Ubuntu OS for compilation,
and flashing the developed RIOT applications.
INDRIYA2 [166] is a testbed for wireless sensor network deployed in National University of Singapore.
INDRIYA2 provides support for various hardware sensor platforms with high data rate capabilities to handle time
series data generated at the time of running application. The architecture of INDRIYA2 comprises Nodes (such as
SensorTag cc2560 and TelosB), Gateways and Servers. Gateways are built from 6 Mac-minis running the Ubuntu
14 OS while Servers are quad core machines with 16 GB of RAM running Ubuntu version 16 OS. The High Influx
DB is used to handle the high rate time stamped data in the form of batches of JSON format. The hardware platform
uses the ARM Cortex-M3 and TI MSP430 micro-controller with various sensor including magnetometer, barometer,
accelerator, gyroscope and microphone. The receiver signal strength, and packet reception rate parameters are used to
measure the link quality during the execution.
TUTORNET [167] testbed is deployed at University of Southern California (USC). The overall layout of the testbed
has four types of nodes as OpenMote, MicaZ, TelosB and Concentrator nodes. The TUTORNET testbed has three layer
of architecture consisting of Central Server, Concentrator and Sensor Nodes. The Central Server performs duties of
testbed reservation implemented by Apache Server in Perl and MySQL running on Ubuntu Linux. The Concentrator
node running Ubuntu Linux deployed on Raspberry-Pi hardware having USB hub for connecting devices. There are
various datasets available in the form of JavaScript Object Notation (JSON) of running experiments of packet delivery
ratio.
CCI IOT [168] is a campus wide testbed for Internet of Things deployed at the Center for Cyber-Physical System and
IoT at the University of Southern California. The testbed is currently in the development phase. The overall architecture
contains the Raspberry-Pi gateway, WiFi access points, server and user application. The Raspberry-Pi version 3 of
Model B with 1.2GHZ quad-core ARM Cortex-A53 processor having 1 GB of RAM and 32 GB of flash memory used
in the deployment of testbed. The various sensors like temperature, humidity, light, air quality, sound and vibration are
being deployed for experimental purpose. Gateways are backed by solar power, covering one mile radius area in the
USC campus.
The above discussion related to the existing testbed that can be used for the RPL-security research. However, all
the testbeds are critically evaluated on the basis of scalability (numbers of nodes, topology supported), compatibility
(hardware nodes, OS supported, programming languages), accessibility (documentation, access type, user interface,
execution, energy profiling), environmental factors (physical tempering, interference, node mobility), heterogeneity
(constrained nodes) and real-world scenarios (attacks and simulation). The critical evaluation of tested is as follows:
• WISEBED [162]: It doesn’t support extendibility, customize-ability and relocation of nodes, provide remote
access of testbed facility but not public accessibility, realistic setting for natural disasters and building monitoring
and support limited mobility facility among nodes, heterogeneity which offer variety of hardware nodes, various
topologies.
• LOG-a-TEC [163]: It doesn’t have public documentation support or scalability. It provides the facility for
remote monitoring and reconfiguration of experiments. It has an outdoor implementation which is affected by
environmental factors. It is focused on heterogeneous application areas consisting of M2M/MTC/Dense IoT
networks which are based on LR-WPAN and LPWAN.
• FIT-IOT LAB [164]: It is an open source and open access (free of charge) testbed that provides scalability,
dynamic topologies, mobility support, re-programmed and reconfigured nodes, heterogeneous hardware nodes
that support a larger set of IoT application. It consists of energy profiling modules to measure the energy
consumption of nodes as well as monitor the performance metrics such as throughput and end-to-end delay.
• NetSecIoT [165]: It has limited documentation with open access accessibility of the testbed. It doesn’t support
hardware heterogeneity as well as scalability. It is compatible with only a single operating system and doesn’t
have an energy consumption module. It supports the remote access of the testbed via remote which gives
flexibility to run the experiments.
• INDRIYA2 [166]: It widely supports the scalability of testbed with numerous heterogeneous sensor and wireless
technologies. It supports high data rates with real-time monitoring of currently running experiments. It provides
a limited access facility to sensor nodes and doesn’t provide the mobility of nodes so limited applicability to
real-time solutions.
• TUTORNET [167]: There is no documentation available to experiment on the testbed so there is no accessibility
feature incorporated. It supports limited scalability and compatibility of hardware nodes. It is deployed inside the
building in an indoor environment with limited mobility support. There is no concept of a real-world scenario
incorporated for this testbed.
Table 15
Simulators for RPL protocol Simulation
Ref Simulator Simulator Type Licensing RPL Compliance Programming OS Platform User Interface
Name Language
[169] Cooja Discrete-Event Open Source Fully C Language Linux, Contiki and Contiki-NG, Ma- GUI and CLI
cOSX
[173] Netsim Research-Based Licensed Moderate C Language Windows/Linux GUI
[177] NS-3 Discrete-Event Open Source Moderate C++ and Windows (Cygwin) /Linux GUI and CLI
Python
[178] OMNet++ Discrete-Event Open Source Moderate C++ and NED Windows (Cygwin) /Linux GUI
[179] TinyRPL - Open Source Moderate C Language Tiny OS -
• CCI IOT Testbed [168]: It provides a wide range of scalable sensor nodes and wireless support for running
and testing IoT experiments. It includes heterogeneous hardware platforms facilitating edge computing and
cloud computing. It incorporates advanced technologies such as Software Defined Networks for IoT research
applications. It is deployed in outdoor environments which limits environmental factors such as physical
tempering, and inference when experiments are performed.
While designing the advance IoT testbeds for running experiments some of the points may be consider such as
dynamic testing which includes node mobility, dynamic topology for real time network, energy modules which give
the insights on power consumption of nodes in terms of battery life, incorporates real world condition such as physical
interference/obstacles or noise and support of advanced emerging technologies such as 5G, SDN. The prebuilt attack
scenario may be added for batter understanding of security threat detection.
5.3. Simulators
The simulator creates a virtual version of real-life situations for experimentation or training purposes. There are
several widely used network simulators for the evaluation and simulation of RPL-based IoT networks by various
researchers. Table 15 provides a resemblance to the state-of-the-art simulators used for the RPL protocol simulation.
The table gives information about parameters such as the type of simulator, licensing arrangements, compliance of
RPL simulators, the programming language used to develop the simulators, the operating system supported by the
simulators, and the user interface provided by simulators.
More than 90% of the researchers used Cooja [169] tool for simulation of RPL networks. Currently the latest Cooja
simulator is available with Contiki-NG [170] OS which is regarded as the next generation operating system for low
power devices. Cooja is a Java based simulator which supports hardware motes such as Z1 motes [171] and Tmote Sky
[172] to facilitate the emulation of various sensors. It supports various functions of RPL protocol such as the operating
mode and objective functions (such as OF0 and MRHOF).
The next widely used simulator of RPL protocol is NetSim [173]. NetSim simulator is a proprietary software of
TETCOS. This simulator supports up to 500 sensor nodes in wired or wireless or mobile for simulation purpose.
The simulator supports the objective functions (OF0 and MRHOF). An additional feature of this simulator is that it
provides the interface for other software packages such as MATLAB [174] and Wireshark [175]. The NetSim provides
the features such as packet animation, output performance matrices and detailed event and packet trace. However, this
simulator has limited RPL support and does not provided some the RPL feature like DODAG repair mechanism, power
consumption analysis, storage overhead in terms of RAM and ROM usage.
The Network Simulator version 3 (NS-3) is another simulator used used for simulating RPL networks. The NS-3
RPL module is developed by [176], as a framework to support the IPv6 based routing over low power and lossy
devices. This simulator supports the objective function (OF0 and MRHOF). However, NS-3 has limited support of
power consumption analysis, development of new objective function and mobility support. The NS-3 has currently in
the development phase for 802.15.4 and 6LoWPAN.
The OMNeT++ supports the limited functionally for the RPL protocol simulation. Recent work in [178] provides
the implementation of RPL for OMNeT++. This implementation considers the existing INET framework available
on OMNeT++ for the modification according to RPL protocol specification available in RFC 6550 [12]. Basically it
implements various modes of operation along with the three modules which maintain upward routing, source routing
table and parent table. The existing implementation supports more than 200 motes which can be advantages for the
• NS-3 [177]: The NS-3 is open source simulator tools with limited RPL readiness. The customized modules
are developed for RPL protocol simulation and it is highly scalable (2000 nodes) in terms of number of nodes
in simulation. It is complex tools which consist extensive library, advanced log analysis facility and required
expertise to use it. It is also no support for pre-built RPL attack modules and energy modules.
• OMNet++ [178]: The open source OMNet++ simulator tool is customized for RPL support consisting limited
functionality. It is flexible and support large scale topology but sometimes performance is degraded. It required
the manual configuration for implementation attack scenario. The current version is unstable and future extension
will have physical layer support and neighbor detection.
• TinyRPL [179]: This simulator has focused implementation of RPL protocol with limited features of RPL with
small amount of scalability for sensor nodes. There is no proper documentation available for attack scenario
implementation. As can be accessed through CLI interface so it is less user friendly and required expertise
users. The performance is degraded when network size is increased.
The future network simulators are designed for RPL-security research should have support of modular attack library,
hybrid scale network for smaller and larger network topologies, energy and performance metrics module, and real
world customization of emerging technologies.
6. Research Challenges
Many defense solutions have been developed in response to the range of RPL-based routing attacks described in
this survey. However, because of RPL’s resource constraints, the developed solutions should not hinder the protocol’s
performance. We will now examine possible future research directions that can be explored in designing a novel defense
mechanism against RPL-based routing attacks.
• Smart Factories: The Industry 4.0 revolution introduces the concept of smart factories, where real-time
monitoring, data storage in the cloud, machine utilization, and process efficiency can be achieved through the
use of smart devices [186]. The RPL protocol is suitable for communicating among the sensor nodes. The
vulnerabilities against RPL can significantly disrupt the factory operation and cause downtime and unexpected
equipment behavior. The substantial aspect of RPL protocol in smart factories scenario will be explored as a
future challenge to protect against RPL-based vulnerabilities for reducing the risk of failure.
• Coordinated Attacks: The limited number of coordinated attacks [56] presented in literature. This type of attacks
where a network of bad actors collaborates to carry out a single attack. This type of attacks are more destructive
in the nature. Hence, the effect of such attack and defense solution can be explored in future.
• Hybrid Attacks: The copycat [61] and sink-clone [60] are the only two hybrid attacks that have been considered
so far. There is an opportunity to explore new possibilities of hybrid attacks by combining two or more attacks
and their mitigation.
• Cross-layer Attacks: Cross-layer attacks attack multiple layers of a protocol’s stack, each of which might severely
influence performance. Researchers have not paid much attention to such cross-layer attacks, despite their
increasing prominence in the RPL domain. Asati et al. [62] is the only work addressing a cross-layer attack
involving rank manipulation and drop delay for RPL.
• Context-Aware and Adaptive RPL: Context-aware routing enables the decision-making of RPL through actual
factors such as the real-time energy of nodes, congestion of traffic, and outer conditions. Using machine learning,
RPL could alter the routing according to network conditions, ensuring optimally high performance. Some
enhancements may be made regarding DODAG adjustments or through adaptive metrics based on network load
and resource availability.
• Integration of Renewable Energy Sources: The lifetime of energy-constrained IoT devices may be increased
through the integration of renewable energy sources, including solar or wind energy. RPL can be tailored to
favor nodes that are energy harvesting enabled and optimize routing based on renewable energy usage. Predictive
algorithms may predict the availability of energy, thereby allowing for proactive routing adjustments in order to
improve network sustainability.
• RPL in Time-Sensitive Applications: Time-sensitive applications like industrial automation and healthcare
require real-time communication. RPL must be adapted to meet strict latency requirements, with enhancements
like deterministic routing to guaranteed latency. Multi-channel communication can reduce congestion and
improve performance for time-critical applications.
• Data Aggregation and Compression in RPL: Data aggregation and compression reduce the overhead and
energy consumption in the RPL networks, mostly when nodes are reporting the same data. Aggregation-aware
routing combines data from various nodes before transmission to reduce messages and conserve bandwidth and
energy. The inclusion of data compression will further enhance network efficiency and extend the lifetime of the
network.
7. Conclusion
This survey gives the comprehensive groundwork for improving the RPL-based security solutions in IoT networks
by novel attack and defense taxonomy, in-depth discussion of RPL-based routing attacks and defense mechanisms,
impact of routing attacks in real life situations, evaluations of existing attack datasets, testbeds, simulators, potential
research challenges and directions. The main idea for classifying attacks on the basis of nature means how it exploits
the RPL and defense mechanisms and focuses on type of strategy. As per the observation, the version number attack is
the most destructive one because of the high impact on energy consumption, routing decisions whereas increasing rank
is least because of low impact of packet delivery ratio. Similarly, most of the defense solutions used RPL specification
to overcome the effect of routing attacks and least used the cryptographic based solution due to high overhead and
memory constraints. The top three performance metrics are packet delivery ratio, energy consumption and detection
accuracy. It is also observed that, the most prominent dataset IRAD, RADAR and RPL-NIDDS17 were used to evaluate
their ML/DL based solutions. Two most significant testbeds that can be used for RPL study are CICIOT and FIT-IOT
LAB as widely available and rich functionalities. Consequently, the COOJA simulator is mostly used by the authors
for evaluations of defense mechanisms as it is open source and provides fully RPL compliance. The major focused
attacks are new dimensions on attacks such as hybrid attacks, cross-layer attacks, some of attacks have unaddressed
or limited solutions. The artificial intelligence based secure solutions for RPL is recommended for real-time threat
modeling in the future. Further, research challenges and future research direction will provide a substantial foundation
for researchers to design and develop more effective defense solutions for emerging RPL routing in IoT networks. Our
survey is limiting the practical implementation of RPL-based routing attacks and defense which could be addressed as
a future work.
References
[1] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. Ayyash, Internet of Things: A Survey on Enabling Technologies, Protocols,
and Applications, IEEE Communications Surveys & Tutorials 17 (2015) 2347–2376.
[2] Recommendation ITU-T Y. 2060: Overview of the Internet of Things, Telecommunication Standardization Sector of ITU (2012) 2060.
[3] S. Krčo, B. Pokrić, F. Carrez, Designing IoT architecture (s): A European perspective, in: IEEE World Forum on Internet of Things (WF-IoT),
IEEE, 2014, pp. 79–84.
[4] M. A. Chaqfeh, N. Mohamed, Challenges in Middleware Solutions for the Internet of Things, in: International Conference on Collaboration
Technologies and Systems (CTS), IEEE, 2012, pp. 21–26.
[5] M. Wu, T.-J. Lu, F.-Y. Ling, J. Sun, H.-Y. Du, Research on the architecture of Internet of Things, in: 3rd International Conference on
Advanced Computer Theory and Engineering (ICACTE), volume 5, IEEE, 2010, pp. V5–484.
[6] A. Alotaibi, A. Barnawi, Securing massive IoT in 6G: Recent solutions, architectures, future directions, Internet of Things (2023) 100715.
[7] J. Granjal, E. Monteiro, J. S. Silva, Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues, IEEE
Communications Surveys & Tutorials 17 (2015) 1294–1312.
[8] N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, N. Ghani, Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities
and a First Empirical Look on Internet-Scale IoT Exploitations, IEEE Communications Surveys & Tutorials 21 (2019) 2702–2733.
[9] I. Butun, P. Österberg, H. Song, Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures, IEEE Communications
Surveys & Tutorials 22 (2019) 616–644.
[10] N. Kushalnagar, G. Montenegro, C. Schumacher, IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs):Overview,
Assumptions, Problem Statement, and Goals, RFC 4919, Fremont, CA, USA, August 2012. [Online]. Available:https://www.rfc-
editor.org/info/rfc4919.
[11] G. Montenegro, N. Kushalnagar, J. Hui, D. Culler, Transmission of IPv6 Packets over IEEE 802.15.4 Networks, RFC 4944, Fremont, CA,
USA, September 2012. [Online]. Available:https://www.rfc-editor.org/info/rfc4944.
[12] T. Winter et al., RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks, RFC 6550, Internet Engineering Task Force, Fremont,
CA, USA, March 2012. [Online]. Available:https://www.rfc-editor.org/info/rfc6550.
[13] B. Gong, C. Guo, C. Guo, Y. Sun, M. Waqas, S. Chen, SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption
Scheme for IoT, IEEE Transactions on Information Forensics and Security 19 (2023) 1299–1312.
[14] S. Tu, A. Badshah, H. Alasmary, M. Waqas, EAKE-WC: Efficient and Anonymous Authenticated Key Exchange Scheme for Wearable
Computing, IEEE Transactions on Mobile Computing (2023).
[15] A. Badshah, G. Abbas, M. Waqas, S. Tu, Z. H. Abbas, F. Muhammad, S. Chen, USAF-IoD: Ultralightweight and Secure Authenticated Key
Agreement Framework for Internet of Drones Environment, IEEE Transactions on Vehicular Technology (2024).
[16] P. hubert, Objective Function Zero for the Routing Protocol for Low-Power and Lossy Networks (RPL), RFC 6552, Fremont, CA, USA,
March 2012. [Online]. Available:https://www.rfc-editor.org/info/rfc6552.
[17] O. Gnawali, P. Levis, The Minimum Rank with Hysteresis Objective Function, RFC 6719, Fremont, CA, USA, September 2012. [Online].
Available:https://www.rfc-editor.org/info/rfc6719.
[18] P. Levis, T. Clausen, J. Hui, O. Gnawali, J. Ko, The Trickle Algorithm, RFC 6206, Fremont, CA, USA, March 2011. [Online].
Available:https://www.rfc-editor.org/info/rfc6206.
[19] L. Wallgren, S. Raza, T. Voigt, Routing Attacks and Countermeasures in the RPL-Based Internet of Things, International Journal of
Distributed Sensor Networks 9 (2013) 794326.
[20] P. Pongle, G. Chavan, A survey: Attacks on RPL and 6LoWPAN in IoT, in: International Conference on Pervasive Computing (ICPC), IEEE,
2015, pp. 1–6.
[21] D. Airehrour, J. Gutierrez, S. K. Ray, Secure routing for internet of things: A survey, Journal of Network and Computer Applications 66
(2016) 198–213.
[22] A. Mayzaud, R. Badonnel, I. Chrisment, A Taxonomy of Attacks in RPL-based Internet of Things, International Journal of Network Security
18 (2016) 459–473.
[23] H.-S. Kim, J. Ko, D. E. Culler, J. Paek, Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey, IEEE
Communications Surveys & Tutorials 19 (2017) 2502–2525.
[24] B. B. Zarpelão, R. S. Miani, C. T. Kawakani, S. C. de Alvarenga, A survey of intrusion detection in Internet of Things, Journal of Network
and Computer Applications 84 (2017) 25–37.
[25] S. Mangelkar, S. N. Dhage, A. V. Nimkar, A comparative study on RPL attacks and security solutions, in: International Conference on
Intelligent Computing and Control (I2C2), IEEE, 2017, pp. 1–6.
[26] P. O. Kamgueu, E. Nataf, T. D. Ndie, Survey on RPL enhancements: A focus on topology, security and mobility, Computer Communications
120 (2018) 10–21.
[27] A. Raoof, A. Matrawy, C.-H. Lung, Routing Attacks and Mitigation Methods for RPL-Based Internet of Things, IEEE Communications
Surveys & Tutorials 21 (2018) 1582–1606.
[28] A. Verma, V. Ranga, Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review, IEEE Sensors Journal 20 (2020)
5666–5690.
[29] Z. A. Almusaylim, A. Alhumam, N. Jhanjhi, Proposing a Secure RPL based Internet of Things Routing Protocol: A Review, Ad Hoc
Networks 101 (2020) 102096.
[30] G. Simoglou, G. Violettas, S. Petridou, L. Mamatas, Intrusion Detection Systems for RPL Security: A Comparative Analysis, Computers &
Security (2021) 102219.
[31] A. M. Pasikhani, J. A. Clark, P. Gope, A. Alshahrani, Intrusion Detection Systems in RPL-Based 6LoWPAN: A Systematic Literature
Review, IEEE Sensors Journal (2021).
[32] A. Seyfollahi, A. Ghaffari, A Review of Intrusion Detection Systems in RPL Routing Protocol Based on Machine Learning for Internet of
Things Applications, Wireless Communications and Mobile Computing 2021 (2021).
[33] A. O. Bang, U. P. Rao, P. Kaliyar, M. Conti, Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A
Survey, ACM Computing Surveys (CSUR) 55 (2022) 1–36.
[34] T. A. Al-Amiedy, M. Anbar, B. Belaton, A. H. H. Kabla, I. H. Hasbullah, Z. R. Alashhab, A systematic literature review on machine and
deep learning approaches for detecting attacks in rpl-based 6lowpan of internet of things, Sensors 22 (2022) 3400.
[35] H. Albinali, F. Azzedin, Towards rpl attacks and mitigation taxonomy: Systematic literature review approach, IEEE Transactions on Network
and Service Management (2024).
[36] N. Alfriehat, M. Anbar, M. Aladaileh, I. Hasbullah, T. A. Shurbaji, S. Karuppayah, A. Almomani, Rpl-based attack detection approaches in
iot networks: review and taxonomy, Artificial Intelligence Review 57 (2024) 248.
[37] F. Algahtani, T. Tryfonas, G. Oikonomou, A Reference Implemenation for RPL Attacks Using Contiki-NG and COOJA, in: 17th International
Conference on Distributed Computing in Sensor Systems (DCOSS), IEEE, 2021, pp. 280–286.
[38] U. Kiran, IDS To Detect Worst Parent Selection Attack In RPL-Based IoT Network, in: 14th International Conference on COMmunication
Systems & NETworkS (COMSNETS), IEEE, 2022, pp. 769–773.
[39] A. Dvir, L. Buttyan, et al., VeRA - Version Number and Rank Authentication in RPL, in: IEEE 8th International Conference on Mobile
Ad-Hoc and Sensor Systems, Valencia, Spain, 2011, pp. 709–714.
[40] A. Le, J. Loo, Y. Luo, A. Lasebae, Specification-based IDS for securing RPL from topology attacks, in: IEEE IFIP Wireless Days (WD),
Niagara Falls, Canada, 2011, pp. 1–3.
[41] A. Rehman, M. M. Khan, M. A. Lodhi, F. B. Hussain, Rank Attack using Objective Function in RPL for Low Power and Lossy Networks,
in: International Conference on Industrial Informatics and Computer Systems (CIICS), IEEE, Sharjah/Dubai, UAE, 2016, pp. 1–5.
[42] M. A. Boudouaia, A. Abouaissa, A. Benayache, P. Lorenz, Divide and Conquer-based Attack against RPL Routing Protocol, in: IEEE Global
Communications Conference(IEEE GLOBECOM), Taipei, Taiwan, 2020, pp. 1–6.
[43] A. Sehgal, A. Mayzaud, R. Badonnel, I. Chrisment, J. Schönwälder, Addressing DODAG inconsistency attacks in RPL networks, in: IEEE
Global Information Infrastructure and Networking Symposium (GIIS), Montreal, Canada, 2014, pp. 1–8.
[44] A. Verma, V. Ranga, Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks, in: IEEE Region 10 Conference
(TENCON), Kochi, India, 2019, pp. 552–557.
[45] F. Medjek, D. Tandjaoui, N. Djedjig, I. Romdhani, Multicast DIS attack mitigation in RPL-based IoT-LLNs, Journal of Information Security
and Applications 61 (2021) 102939.
[46] C. Pu, Spam DIS Attack Against Routing Protocol in the Internet of Things, in: IEEE International Conference on Computing, Networking
and Communications (ICNC), Hawaii, USA, 2019, pp. 73–77.
[47] M. Duroyon, STIR: Preventing Routing Table Overload Attacks in RPL-based IoT Networks, Bachelor thesis, Computer Sci-
ence and Engineering, Delft University of Technology, Delft, Netherlands, 2021. URL: http://resolver.tudelft.nl/uuid:
03b45e33-2af2-48e7-8dd3-017eb7c99ef4.
[48] C. Pu, Mitigating DAO inconsistency attack in RPL-based low power and lossy networks, in: IEEE 8th Annual Computing and
Communication Workshop and Conference (CCWC), Las Vegas, USA, 2018, pp. 570–574.
[49] P. Perazzo, C. Vallati, G. Anastasi, G. Dini, DIO Suppression Attack Against Routing in the Internet of Things, IEEE Communications
Letters 21 (2017) 2524–2527.
[50] L. Zhang, G. Feng, S. Qin, Intrusion detection system for RPL from routing choice intrusion, in: International Conference on Communication
Workshop (ICCW), IEEE, 2015, pp. 2652–2658.
[51] B. Ghaleb, A. Al-Dubai, E. Ekonomou, M. Qasem, I. Romdhani, L. Mackenzie, Addressing the DAO Insider Attack in RPL’s Internet of
Things Networks, IEEE Communications Letters 23 (2018) 68–71.
[52] C. Pu, T. Song, Hatchetman Attack: A Denial of Service Attack Against Routing in Low Power and Lossy Network, in: 5th IEEE International
Conference on Cyber Security and Cloud Computing (CSCloud)/4th IEEE International Conference on Edge Computing and Scalable Cloud
(EdgeCom), Shanghai, China, 2018, pp. 12–17.
[53] C. Pu, Energy Depletion Attack Against Routing Protocol in the Internet of Things, in: 16th IEEE Annual Consumer Communications &
Networking Conference (CCNC), IEEE, 2019, pp. 1–4.
[54] S. Raza, L. Wallgren, T. Voigt, SVELTE: Real-time intrusion detection in the Internet of Things, Ad Hoc Networks 11 (2013) 2661–2674.
[55] B. Chen, Y. Li, D. Mashima, Analysis and Enhancement of RPL under Packet Drop Attacks, in: IEEE 10th International Conference on
Communication Systems & Networks (COMSNETS), Bengaluru, India, 2018, pp. 167–174.
[56] D. Essaadi, Detection and mitigation technique against collusion attack in RPL-Based IoT networks, Bachelor thesis, Computer
Science and Engineering, Delft University of Technology, Delft, Netherlands, 2021. URL: http://resolver.tudelft.nl/uuid:
3fd9a90c-186c-4248-b2b9-9a0e6499882b.
[57] T. Zhang, T. Zhang, X. Ji, W. Xu, Cuckoo-RPL: Cuckoo Filter based RPL for Defending AMI Network from Blackhole Attacks, in: Chinese
Control Conference (CCC), IEEE, 2019, pp. 8920–8925.
[58] M. Sheibani, B. Barekatein, E. Arvan, A lightweight distributed detection algorithm for DDAO attack on RPL routing protocol in Internet
of Things, Pervasive and Mobile Computing (2022) 101525.
[59] K. Zhang, X. Liang, R. Lu, X. Shen, Sybil Attacks and Their Defenses in the Internet of Things, IEEE Internet of Things Journal 1 (2014)
372–383.
[60] S. M. H. Mirshahjafari, B. S. Ghahfarokhi, Sinkhole+CloneID: A hybrid attack on RPL performance and detection method, Information
Security Journal: A Global Perspective 28 (2019) 107–119.
[61] A. Verma, V. Ranga, Addressing Copycat Attacks in IPv6-Based Low Power and Lossy Networks, in: Science and Information Conference,
Springer, 2020, pp. 415–426.
[62] V. K. Asati, E. S. Pilli, S. K. Vipparthi, S. Garg, S. Singhal, S. Pancholi, RMDD: Cross Layer Attack in Internet of Things, in: International
Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE, 2018, pp. 172–178.
[63] A. Le, J. Loo, Y. Luo, A. Lasebae, The Impacts of Internal Threats towards Routing Protocol for Low power and lossy Network Performance,
in: IEEE symposium on computers and communications (ISCC), IEEE, 2013, pp. 000789–000794.
[64] R. Sahay, G. Geethakumari, B. Mitra, A novel Network Partitioning Attack against Routing Protocol in Internet of Things, Ad Hoc Networks
(2021) 102583.
[65] A. S. Baghani, S. Rahimpour, M. Khabbazian, The DAO Induction Attack: Analysis and Countermeasure, IEEE Internet of Things Journal
(2021).
[66] U. Shafique, A. Khan, A. Rehman, F. Bashir, M. Alam, Detection of rank attack in routing protocol for Low Power and Lossy Networks,
Springer Annals of Telecommunications 73 (2018) 429–438.
[67] I. Wadhaj, B. Ghaleb, C. Thomson, A. Al-Dubai, W. J. Buchanan, Mitigation Mechanisms Against the DAO Attack on the Routing Protocol
for Low Power and Lossy Networks (RPL), IEEE Access 8 (2020) 43665–43675.
[68] A. Verma, V. Ranga, Mitigation of DIS flooding attacks in RPL-based 6LoWPAN networks, Wiley Transactions on Emerging
Telecommunications technologies 31 (2020) e3802.
[69] E. Abhinaya, B. Sudhakar, A secure routing protocol for low power and lossy networks based 6LoWPAN networks to mitigate DIS flooding
attacks, Journal of Ambient Intelligence and Humanized Computing (2021) 1–12.
[70] I. S. Alsukayti, A. Singh, A Lightweight Scheme for Mitigating RPL Version Number Attacks in IoT Networks, IEEE Access 10 (2022)
111115–111133.
[71] Z. A Almusaylim, N. Jhanjhi, A. Alhumam, Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things:
SRPL-RP , Sensors 20 (2020) 5997.
[72] A. Arış, S. B. Ö. Yalçın, S. F. Oktuğ, New lightweight mitigation techniques for RPL version number attacks, Ad Hoc Networks 85 (2019)
81–91.
[73] P. Nandhini, S. Kuppuswami, S. Malliga, R. DeviPriya, A Lightweight Energy-Efficient Algorithm for mitigation and isolation of Internal
Rank Attackers in RPL based Internet of Things, Computer Networks 218 (2022) 109391.
[74] S. Karmakar, J. Sengupta, S. D. Bit, LEADER: Low Overhead Rank Attack Detection for Securing RPL based IoT, in: International
Conference on COMmunication Systems & NETworkS (COMSNETS), IEEE, 2021, pp. 429–437.
[75] A. Le, J. Loo, K. K. Chai, M. Aiash, A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology, Information 7
(2016) 25.
[76] P. Kaliyar, W. B. Jaballah, M. Conti, C. Lal, LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks,
Computers & Security 94 (2020) 101849.
[77] M. Zaminkar, R. Fotohi, SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and
Ranking Mechanism, Wireless Personal Communications 114 (2020) 1287–1312.
[78] M. A. Boudouaia, A. Abouaissa, A. Ali-Pacha, A. Benayache, P. Lorenz, RPL rank based-attack mitigation scheme in IoT environment,
International Journal of Communication Systems 34 (2021) e4917.
[79] R. Sahay, G. Geethakumari, B. Mitra, Mitigating the worst parent attack in RPL based Internet of Things, Cluster Computing (2022) 1–18.
[80] A. Bang, U. P. Rao, EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based Internet of Things, Peer-to-
Peer Networking and Applications (2022) 1–24.
[81] P. Nandhini, S. Kuppuswami, S. Malliga, R. DeviPriya, Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT
networks by early detection and isolation of rank attackers, The Journal of Supercomputing (2022) 1–24.
[82] A. Alsirhani, M. A. Khan, A. Alomari, S. Maryam, A. Younas, M. Iqbal, M. H. Siqqidi, A. Ali, Securing Low-Power Blockchain-Enabled
IoT Devices Against Energy Depletion Attack, ACM Transactions on Internet Technology (TOIT) (2022).
[83] S. Goel, A. Verma, V. K. Jain, CRA-RPL: A Novel Lightweight Challenge-Response Authentication-based Technique for Securing RPL
Against Dropped DAO Attacks, Computers & Security (2023) 103346.
[84] D. Airehrour, J. A. Gutierrez, S. K. Ray, SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things, Future Generation
Computer Systems 93 (2019) 860–876.
[85] S. Shin, K. Kim, T. Kwon, Detection of malicious packet dropping attacks in RPL-based Internet of Things, International Journal of Ad Hoc
and Ubiquitous Computing 31 (2019) 133–141.
[86] M. Nikravan, A. Movaghar, M. Hosseinzadeh, A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power
and Lossy Networks, Wireless Personal Communications 99 (2018) 1035–1059.
[87] H. Perrey, M. Landsmann, O. Ugus, M. Wählisch, T. C. Schmidt, TRAIL: Topology Authentication in RPL, in: Proc. of International
Conference on Embedded Wireless Systems and Networks, Graz, Austria, 2016, pp. 59–64.
[88] A. Althubaity, T. Gong, K.-K. Raymond, M. Nixon, R. Ammar, S. Han, Specification-based Distributed Detection of Rank-related Attacks
in RPL-based Resource-Constrained Real-Time Wireless Networks, in: IEEE Conference on Industrial Cyberphysical Systems (ICPS),
volume 1, Tampere, Finland, 2020, pp. 168–175.
[89] M. Surendar, A. Umamakeswari, InDReS: An Intrusion Detection and response system for Internet of Things with 6LoWPAN, in: IEEE
International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 2016, pp. 1903–
1908.
[90] Z. A. Khan, P. Herrmann, A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things, in: 31st International Conference
on Advanced Information Networking and Applications (AINA), Taipei, Taiwan, 2017, pp. 1169–1176.
[91] H. Bostani, M. Sheikhan, Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on
MapReduce approach, Computer Communications 98 (2017) 52–71.
[92] J. Arshad, M. A. Azad, M. M. Abdellatif, M. H. U. Rehman, K. Salah, COLIDE: a collaborative intrusion detection framework for Internet
of Things, IET Networks 8 (2018) 3–14.
[93] A. Verma, V. Ranga, CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis, Telecommunication Systems
75 (2020) 43–61.
[94] D. B. Gothawal, S. Nagaraj, Anomaly-Based Intrusion Detection System in RPL by Applying Stochastic and Evolutionary Game Models
over IoT Environment, Wireless Personal Communications 110 (2020) 1323–1344.
[95] G. Violettas, G. Simoglou, S. Petridou, L. Mamatas, A Softwarized Intrusion Detection System for the RPL-based Internet of Things
networks, Future Generation Computer Systems 125 (2021) 698–714.
[96] A. Agiollo, M. Conti, P. Kaliyar, T.-N. Lin, L. Pajola, DETONAR: Detection of Routing Attacks in RPL-Based IoT, IEEE Transactions on
Network and Service Management 18 (2021) 1178–1190.
[97] D. Ray, P. Bhale, S. Biswas, P. Mitra, S. Nandi, A Novel Energy-efficient Scheme For RPL Attacker Identification In IoT Networks Using
Discrete Event Modeling, IEEE Access (2023).
[98] A. Deveci, S. Yilmaz, S. Sen, Evolving Lightweight Intrusion Detection Systems for RPL-Based Internet of Things, in: International
Conference on the Applications of Evolutionary Computation (Part of EvoStar), Springer, 2023, pp. 177–193.
[99] P. Bhale, S. Biswas, S. Nandi, A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks, International Journal of
Information Security 23 (2024) 915–934.
[100] C. Cervantes, D. Poplade, M. Nogueira, A. Santos, Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of
Things, in: IFIP/IEEE International Symposium on Integrated Network Management (IM), Ottawa, Canada, 2015, pp. 606–611.
[101] D. Airehrour, J. Gutierrez, S. K. Ray, Securing RPL routing protocol from blackhole attacks using a trust-based mechanism, in: 26th
International Telecommunication Networks and Applications Conference (ITNAC), Dunedin, New Zealand, 2016, pp. 115–120.
[102] M. Pishdar, Y. Seifi, M. Nasiri, M. Bag-Mohammadi, PCC-RPL: An efficient trust-based security extension for RPL, Information Security
Journal: A Global Perspective (2021) 1–11.
[103] K. Prathapchandran, T. Janani, A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random
forest – RFTRUST, Computer Networks 198 (2021) 108413.
[104] A. Bang, U. P. Rao, A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use
case, The Journal of Supercomputing (2021) 1–36.
[105] A. Patel, D. Jinwala, A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things, International Journal of Information
Security and Privacy (IJISP) 15 (2021) 1–17.
[106] J.-D. Kim, M. Ko, J.-M. Chung, Physical Identification based Trust Path Routing Against Sybil Attacks on RPL in IoT Networks, IEEE
Wireless Communications Letters (2022).
[107] P. Thulasiraman, Y. Wang, A lightweight trust-based security architecture for RPL in mobile IoT networks, in: 16th IEEE Annual Consumer
Communications & Networking Conference (CCNC), IEEE, 2019, pp. 1–6.
[108] T. ul Hassan et al., CTrust-RPL: A control layer-based trust mechanism for supporting secure routing in routing protocol for low power and
lossy networks-based Internet of Things applications, Transactions on Emerging Telecommunications Technologies 32 (2021) e4224.
[109] A. Patel, D. Jinwala, A reputation-based RPL protocol to detect selective forwarding attack in Internet of Things, International Journal of
Communication Systems (2022) e5007.
[110] J. Jiang, Y. Liu, Secure IoT Routing: Selective Forwarding Attacks and Trust-based Defenses in RPL Network, arXiv preprint
arXiv:2201.06937 (2022).
[111] J. Foley, N. Moradpoor, H. Ochenyi, Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two
Objective Functions Using a Novel Dataset, Security and Communication Networks 2020 (2020).
[112] M. Osman, J. He, F. M. M. Mokbal, N. Zhu, S. Qureshi, ML-LGBM: A Machine Learning Model Based on Light Gradient Boosting Machine
for the Detection of Version Number Attacks in RPL-Based Networks, IEEE Access (2021).
[113] A. Mehbodniya, J. L. Webber, M. Shabaz, H. Mohafez, K. Yadav, Machine Learning Technique to Detect Sybil Attack on IoT Based Sensor
Network, IETE Journal of Research (2021) 1–9.
[114] P. J. Prakash, B. Lalitha, Optimized Ensemble Classifier Based Network Intrusion Detection System for RPL Based Internet of Things,
Wireless Personal Communications (2022) 1–24.
[115] M. Osman, J. He, N. Zhu, F. M. M. Mokbal, An ensemble learning framework for the detection of RPL attacks in IoT networks based on the
genetic feature selection approach, Ad Hoc Networks 152 (2024) 103331.
[116] D. Paganraj, Dair-mlt: detection and avoidance of IoT routing attacks using machine learning techniques, International Journal of Information
Technology (2024) 1–9.
[117] F. Y. Yavuz, Ü. Devrim, G. Ensar, Deep Learning for Detection of Routing Attacks in the Internet of Things, International Journal of
Computational Intelligence Systems 12 (2018) 39.
[118] C. D. Morales-Molina et al., A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT, Sensors
21 (2021) 3173.
[119] M. Shirafkan, A. Shahidienjad, M. Ghobaei-Arani, An autonomous intrusion detection system for the RPL protocol, Peer-to-Peer Networking
and Applications (2021) 1–19.
[120] M. Osman, J. He, F. M. M. Mokbal, N. Zhu, Artificial Neural Network Model for Decreased Rank Attack Detection in RPL Based on IoT
Networks, International Journal of Network Security 23 (2021) 496–503.
[121] S. Sharma, V. K. Verma, AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things, The
Journal of Supercomputing (2021) 1–31.
[122] R. Sahay, G. Geethakumari, B. Mitra, A holistic framework for prediction of routing attacks in IoT-LLNs, The Journal of Supercomputing
78 (2022) 1409–1433.
[123] S. Nayak, N. Ahmed, S. Misra, Deep Learning-Based Reliable Routing Attack Detection Mechanism for Industrial Internet of Things, Ad
Hoc Networks 123 (2021) 102661.
[124] M. Albishari, M. Li, R. Zhang, E. Almosharea, Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things
networks, The Journal of Supercomputing (2022) 1–28.
[125] R. Alghamdi, M. Bellaiche, A cascaded federated deep learning based framework for detecting wormhole attacks in IoT networks, Computers
& Security 125 (2023) 103014.
[126] Y. Al Sawafi, A. Touzene, R. Hedjam, Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks, Journal of Sensor
and Actuator Networks 12 (2023) 21.
[127] S. Budania, M. V. Shenoy, OEAD: An Online Ensemble-based Anomaly Detection technique for RPL network, in: Proceedings of the 25th
International Conference on Distributed Computing and Networking, 2024, pp. 316–321.
[128] F. Hussain, R. Hussain, S. A. Hassan, E. Hossain, Machine Learning in IoT Security: Current Solutions and Future Challenges, IEEE
Communications Surveys & Tutorials 22 (2020) 1686–1721.
[129] M. Waqas, S. Tu, Z. Halim, S. U. Rehman, G. Abbas, Z. H. Abbas, The Role of Artificial Intelligence and Machine Learning in Wireless
Networks Security: Principle, Practice and Challenges, Artificial Intelligence Review 55 (2022) 5215–5261.
[130] M. Comiter, Attacking Artificial Intelligence: AI’s Security Vulnerability and What Policymakers Can Do About It, Technical Report,
Cambridge, MA 02138, August 2019.
[131] T. A. Ahanger, A. Aljumah, M. Atiquzzaman, State-of-the-art survey of artificial intelligent techniques for iot security, Computer Networks
206 (2022) 108771.
[132] D. C. Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, H. V. Poor, Federated Learning for Internet of Things: A Comprehensive
Survey, IEEE Communications Surveys & Tutorials 23 (2021) 1622–1658.
[133] B. Wu, S. He, Self-learning and explainable deep learning network toward the security of artificial intelligence of things, The Journal of
Supercomputing 79 (2023) 4436–4467.
[134] C. S. Kalutharage, X. Liu, C. Chrysoulas, N. Pitropakis, P. Papadopoulos, Explainable AI-based DDOS attack identification method for IoT
networks, Computers 12 (2023) 32.
[135] F. Ahmed, Y.-B. Ko, Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks, Security and Communication
Networks 9 (2016) 5143–5154.
[136] H. B. Patel, D. C. Jinwala, Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach, in: IEEE Region 10
Conference (TENCON), IEEE, 2019, pp. 947–954.
[137] P. P. Ioulianou, V. G. Vassilakis, Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of Things, in: Computer
Security, Springer, 2019, pp. 374–390.
[138] A. D. Seth, S. Biswas, A. K. Dhar, Detection and Verification of Decreased Rank Attack using Round-Trip Times in RPL-Based 6LoWPAN
Networks, in: IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), IEEE, 2020, pp. 1–6.
[139] G. Aljufair, M. Mahyoub, A. S. Almazyad, On mitigating dis attacks in iot networks, in: 2023 18th Wireless On-Demand Network Systems
and Services Conference (WONS), IEEE, 2023, pp. 104–109.
[140] G. Sharma, J. Grover, A. Verma, QSec-RPL: Detection of version number attacks in RPL based mobile IoT using Q-Learning, Ad Hoc
Networks 142 (2023) 103118.
[141] A. Mayzaud, A. Sehgal, R. Badonnel, I. Chrisment, J. Schönwälder, Mitigation of topological inconsistency attacks in RPL-based low-power
lossy networks, International Journal of Network Management 25 (2015) 320–339.
[142] S. Luangoudom, D. Tran, T. Nguyen, H. A. Tran, G. Nguyen, Q. T. Ha, svBLOCK: mitigating black hole attack in low-power and lossy
networks, International Journal of Sensor Networks 32 (2020) 77–86.
[143] C. Pu, K.-K. R. Choo, Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function, Computers &
Security 113 (2022) 102541.
[144] M. Conti, P. Kaliyar, M. M. Rabbani, S. Ranise, SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things, in: 14th
International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE, 2018, pp. 1–8.
[145] B. Groves, C. Pu, A Gini Index-Based Countermeasure Against Sybil Attack in the Internet of Things, in: Military Communications
Conference (MILCOM), IEEE, 2019, pp. 1–6.
[146] C. Pu, Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses, IEEE Internet of Things Journal 7 (2020) 4937–4949.
[147] V. Kiran, S. Rani, P. Singh, Towards a Light Weight Routing Security in IoT Using Non-cooperative Game Models and Dempster–Shaffer
Theory, Wireless Personal Communications 110 (2020) 1729–1749.
[148] G. Sharma, J. Grover, A. Verma, A Lightweight Security Solution for Mitigation of Hatchetman Attack in RPL-based 6LoWPAN, in:
2023 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), 2023, pp. 750–755. doi:10.1109/
ANTS59832.2023.10469481.
[149] R. Sahay, G. Geethakumari, K. Modugu, Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT, in:
4th World Forum on Internet of Things (WF-IoT), Singapore, 2018, pp. 308–313.
[150] D. B. Gothawal, S. Nagaraj, An intelligent and lightweight intrusion detection mechanism for RPL routing attacks by applying automata
model, Information Security Journal: A Global Perspective (2021) 1–20.
[151] R. Sahay, G. Geethakumari, B. Mitra, A novel blockchain based framework to secure IoT-LLNs against routing attacks, Computing 102
(2020) 2445–2470.
[152] B. Farzaneh, M. Koosha, E. Boochanpour, E. Alizadeh, A New Method for Intrusion Detection on RPL Routing Protocol Using Fuzzy Logic,
in: 6th International Conference on Web Research (ICWR), IEEE, 2020, pp. 245–250.
[153] A. Verma, V. Ranga, ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things, in: 4th
International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), IEEE, 2019, pp. 1–6.
[154] E. Aydogan, S. Yilmaz, S. Sen, I. Butun, S. Forsström, M. Gidlund, A Central Intrusion Detection System for RPL-Based Industrial Internet
of Things, in: 15th IEEE International Workshop on Factory Communication Systems (WFCS), IEEE, 2019, pp. 1–5.
[155] F. Medjek, D. Tandjaoui, N. Djedjig, I. Romdhani, Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things,
International Journal of Critical Infrastructure Protection 34 (2021) 100436.
[156] E. Canbalaban, S. Sen, A Cross-Layer Intrusion Detection System for RPL-Based Internet of Things, in: International Conference on Ad-Hoc
Networks and Wireless, Springer, 2020, pp. 214–227.
[157] Y. Al-Hadhrami, F. K. Hussain, Real time dataset generation framework for intrusion detection systems in IoT, Future Generation Computer
Systems 108 (2020) 414–423.
[158] A. M. Said, A. Yahyaoui, T. Abdellatif, Efficient Anomaly Detection for Smart Hospital IoT Systems, Sensors 21 (2021) 1026.
[159] R. Bokka, T. Sadasivam, Machine Learning Techniques To Detect Routing Attacks In Rpl Based Internet Of Things Networks, International
Journal of Electrical Engineering and Technology 12 (2021) 6.
[160] M. EMEÇ, M. H. ÖZCANHAN, ROUT-4-2023: RPL Based Routing Attack Dataset for IoT, 2023. URL: https://dx.doi.org/10.
21227/3mbe-5j70. doi:10.21227/3mbe-5j70.
[161] A. A. R. A. Omar, B. Soudan, A. Altaweel, UOS_IOTSH_2024: A Comprehensive network traffic dataset for sinkhole attacks in diverse
RPL IoT networks, Data in Brief 55 (2024) 110650.
[162] I. Chatzigiannakis et al., WISEBED: An Open Large-Scale Wireless Sensor Network Testbed, in: International Conference on Sensor
Applications, Experimentation and Logistics, Springer, 2009, pp. 68–87.
[163] LOG-a-TEC : Testbeds with sensor platforms, SensorLab. Accessed December 05, 2024, 2016. URL: http://log-a-tec.eu.
[164] C. Adjih et al., FIT IoT-LAB: A large scale open experimental IoT testbed, in: IEEE 2nd World Forum on Internet of Things (WF-IoT),
IEEE, 2015, pp. 459–464.
[165] R. Tu, NetsecIoT Testbed, Accessed December 05, 2024, 2017. URL: https://github.com/lightertu/NetsecIoT/wiki.
[166] P. Appavoo, E. K. William, M. C. Chan, M. Mohammad, Indriya2: A Heterogeneous Wireless Sensor Network (WSN) Testbed, in:
International Conference on Testbeds and Research Infrastructures, Springer, 2018, pp. 3–19.
[167] Tutornet: A Low Power Wireless IoT Testbed, USC Viterbi. Accessed December 05, 2024, 2017. URL: http://anrg.usc.edu/www/
tutornet/.
[168] CCI IoT TESTBED : A Campus-wide Internet-of-Things Testbed, USC Viterbi. Accessed December 05, 2024, 2020. URL: http://cci.
usc.edu/index.php/cci-iot-testbed/.
[169] F. Osterlind et al., Cross-Level Sensor Network Simulation with COOJA, in: 31st IEEE Conference on Local Computer Networks, IEEE,
2006, pp. 641–648.
[170] G. Oikonomou, S. Duquennoy, A. Elsts, J. Eriksson, Y. Tanaka, N. Tsiftes, The Contiki-NG open source operating system for next generation
IoT devices, SoftwareX 18 (2022) 101089.
[171] Zolertia z1 motes, GitHub. Accessed December 05, 2024, 2019. URL: https://github.com/contiki-os/contiki/wiki/
Zolertia-z1-motes.
[172] Tmote Sky, Low Power Wireless Sensor Module, Moteiv. Accessed December 05, 2024, 2013. URL: https://insense.cs.st-andrews.
ac.uk/files/2013/04/tmote-sky-datasheet.pdf.
[173] NetSim Simulator, TETCOS LLP. Accessed December 05, 2024, 2015. URL: https://www.tetcos.com/iot-wsn.html.
[174] D. J. Higham, N. J. Higham, MATLAB guide, SIAM, 2016.
[175] A. Orebaugh, G. Ramirez, J. Beale, Wireshark & Ethereal network protocol analyzer toolkit, Elsevier, 2006.
[176] L. Bartolozzi et al., ns-3 RPL module: IPv6 Routing Protocol for Low power and Lossy Networks, in: 5th International Conference on
Simulation Tools and Techniques(ICST), 2012, pp. 359–366.
[177] J. P. C. Agustin et al., IPv6 routing protocol for low-power and lossy networks implementation in network simulator — 3, in: IEEE Region
10 Conference(TENCON), IEEE, 2017, pp. 3129–3134.
[178] H. Hosseini, E. Rojas, D. Carrascal, Implementation of RPL in OMNeT++, arXiv preprint arXiv:2107.02551 (2021).
[179] J. Ko et al., ContikiRPL and TinyRPL: Happy Together, in: Workshop on Extending the Internet to Low Power and Lossy Networks (IP+
SN), volume 570, Citeseer, 2011.
[180] J. Ko et al., Evaluating the Performance of RPL and 6LoWPAN in TinyOS, in: Workshop on Extending the Internet to Low Power and Lossy
Networks (IP+ SN), volume 80, Citeseer, 2011, pp. 85–90.
[181] TelosB Mote Module, Instrumentation Devices Srl. Accessed December 05, 2024, 2010. URL: https://www.instrumentation.it/
gallery/5646/2010_11_24_12_19_43_telosb_datasheet_id_NEW.pdf.
[182] Cortex-M3, arm Developer. Accessed December 05, 2024, 2020. URL: https://developer.arm.com/Processors/Cortex-M3.
[183] Raspberry Pi 4, Raspberry Pi Foundation. Accessed December 05, 2024, 2020. URL: https://www.raspberrypi.com/products/
raspberry-pi-4-model-b/.
[184] K. He, D. D. Kim, M. R. Asghar, Adversarial machine learning for network intrusion detection systems: A comprehensive survey, IEEE
Communications Surveys & Tutorials (2023).
[185] K. Li et al., When Internet of Things Meets Metaverse: Convergence of Physical and Cyber Worlds, arXiv preprint arXiv:2208.13501 (2022).
[186] K. Tange, M. De Donno, X. Fafoutis, N. Dragoni, A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog
Computing Opportunities, IEEE Communications Surveys & Tutorials 22 (2020) 2489–2520.