Next Article in Journal
Paper Sludge Carbon as an Adsorbent for Fukushima Radiocontaminated Paddy Soil
Next Article in Special Issue
Artificial Intelligence Evolution in Smart Buildings for Energy Efficiency
Previous Article in Journal
A Vision-Based Two-Stage Framework for Inferring Physical Properties of the Terrain

Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT

Departamento de Ingenieria de Sistemas, Universidad del Norte, Barranquilla 081007, Colombia
Departamento de Ingenieria en Telecomunicaciones, Universidad Nacional Autonoma de Mexico, Ciudad de Mexico 04510, Mexico
Author to whom correspondence should be addressed.
Appl. Sci. 2020, 10(18), 6472;
Received: 9 July 2020 / Revised: 1 September 2020 / Accepted: 7 September 2020 / Published: 17 September 2020
(This article belongs to the Special Issue Artificial Intelligence and Emerging Technologies)
The Internet of things (IoT) is a concept that has gained traction over the last decade. IoT networks have evolved around the wireless sensor network (WSN), and the following research looks at relevant IoT concepts and the different security issues that occur specifically at the network layer. This analysis is performed using a structured literature review (SLR). This form of bibliographic review has been a trend in recent years. Its strength is the performance of a bibliometric analysis that allows studying both trends in the line of research that you want to address and the relevant authors. This SLR reviews 53 proposals between 2011 and 2020, whose contribution is to mitigate attacks in the RPL (Routing Protocol for Low-Power and Lossy Networks) protocol. The revised proposals emerged after selecting keywords and databases in which to apply the search. Initially, approximately 380 research works appeared, for which it was necessary to continue using filters to refine the proposals to be included. After reading titles and abstracts, 53 papers were finally selected. In addition to analyzing the attacks mitigated in the RPL protocol, it is intended to identify the trend by which these attacks are reduced, as a result of the review, nine attacks have been found: rank, blackhole, selective forwarding, wormhole, DODAG (Destination-Oriented Directed Acyclic Graph) version number, DAO (Destination Advertisement Object) inconsistency, DIO (DODAG Information Object) suppression, Sybil, and sinkhole. Each of the 53 proposals analyzed in this review has an associated mitigation strategy, these strategies have been categorized into four groups, based on authentication or cryptography, based on network monitoring, based on secure parent node selection and other. According to the results, the authors’ primary mitigation strategy is based on network monitoring, with 30%. This review also identifies the principal authors and countries that need the development of this line of research. View Full-Text
Keywords: security in RPL; attacks in RPL; wireless sensor networks; internet of things security in RPL; attacks in RPL; wireless sensor networks; internet of things
Show Figures

Figure 1

MDPI and ACS Style

Avila, K.; Jabba, D.; Gomez, J. Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT. Appl. Sci. 2020, 10, 6472.

AMA Style

Avila K, Jabba D, Gomez J. Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT. Applied Sciences. 2020; 10(18):6472.

Chicago/Turabian Style

Avila, Karen, Daladier Jabba, and Javier Gomez. 2020. "Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT" Applied Sciences 10, no. 18: 6472.

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Back to TopTop