Version Number Attacks in RPL based IoT Networks State of the Art and Future directions

Mohammed Boudouaia, Valentin Tournois, Samir Ouchani, Abdelrahman Abuarqoub

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The Routing Protocol for Low-Power and Lossy Networks (RPL) faces various challenges, including resource constraints and security threats. Notably, RPL-based environments are susceptible to attacks such as version number attacks due to the limited security measures in the original protocol. Over the years, extensive research has been conducted to address and mitigate these vulnerabilities, with several detection methods proposed using techniques like blockchain, machine learning, and intrusion detection algorithms. This paper focuses on version number attacks in RPL-based IoT networks, reviewing recent and relevant studies that address this issue and propose detection and mitigation frameworks. Additionally, it highlights the challenges and outlines future research directions in securing RPL networks.
Original languageEnglish
Title of host publicationProceedings of 2024 the 8th International Conference on Future Networks and Distributed Systems, ICFNDS 2024
PublisherAssociation for Computing Machinery
Pages276-282
Number of pages7
ISBN (Electronic)9798400711701
DOIs
Publication statusPublished - 2 Jul 2025
Event8th International Conference on Future Networks and Distributed Systems, ICFNDS 2024 - Marrakech, Morocco
Duration: 11 Dec 202412 Dec 2024

Publication series

NameACM International Conference Proceeding Series

Conference

Conference8th International Conference on Future Networks and Distributed Systems, ICFNDS 2024
Country/TerritoryMorocco
CityMarrakech
Period11/12/2412/12/24

Keywords

  • Blockchain
  • Internet of Things (IoT)
  • RPL
  • Security
  • Version Number Attacks

Cite this