Abstract

The Internet of Things (IoT) is one of the most rapidly evolving networking concepts, offering various applications for human benefit. Advances in embedded system architecture and compressed IPv6 have enabled IP stack functionality in resource-constrained heterogeneous smart devices. The IETF Routing Over Low power and Lossy network (ROLL) Working Group (WG) devised IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) to enable the communication between network nodes in IPv6 over Low-power Wireless Personal Area Network (6LoWPAN). The limited resources and heterogeneity of 6LoWPAN nodes make it challenging to design a security solution for Low Power and Lossy Networks, making them vulnerable to various security threats and attacks. Numerous security mechanisms based on trust, threshold, secure routing, authentication, and encryption have shown promising results in detecting anomalous activities in RPL-based 6LoWPAN. As a result, this study systematically examines and critically analyses the existing research domain on RPL security mechanisms. This research presents a comprehensive analysis of demographic characteristics, existing and new attacks, simulation programmes, network configuration, and evaluation measures in RPL-based 6LoWPAN. In addition, it proposes a thorough discussion of current issues, research challenges, and suggestions for future research avenues. This study reveals that most of the studies are published in IEEE Xplore® database and mainly comprises journal articles. Furthermore, the trust-based mechanism is the most used security mechanism for securing RPL-based 6LoWPAN. Finally, the Version Number, BlackHole, and Sybil attacks are the most discussed attacks in the selected studies.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call