results confirm this hypotheses and show that OF0 is
more robust to attacks than MRHOF and, MRHOF-
ENERGY obtains the worst packet delivery ratio. The
results also show that attacks targeting network re-
sources (version number and DIS flooding attacks)
have a more clear effect on all network performance
metrics. We believe researchers developing security
solutions for RPL will benefit from the results pre-
sented in this current study. The study could be ex-
tended with more attack types and more parameters
such as mobility in the future.
REFERENCES
Abhishek, V. and Virender, R. (2020). Security of rpl based
6lowpan networks in the internet of things: A review.
IEEE Sensors Journal, 20(11):5666–5690.
Al-Kashoash, H. A., Al-Nidawi, Y., and Kemp, A. H.
(2016). Congestion-aware rpl for 6l0wpan net-
works. In 2016 Wireless Telecommunications Sympo-
sium (WTS), pages 1–6. IEEE.
Arıs¸, A. and Oktu
˘
g, S. F. (2020). Analysis of the rpl version
number attack with multiple attackers. In 2020 Inter-
national Conference on Cyber Situational Awareness,
Data Analytics and Assessment (CyberSA), pages 1–8.
IEEE.
Aris, A., Oktug, S. F., and Yalcin, S. B. O. (2016). Rpl
version number attacks: In-depth study. In NOMS
2016-2016 IEEE/IFIP Network Operations and Man-
agement Symposium, pages 776–779. IEEE.
Barthel, D., Vasseur, J., Pister, K., Kim, M., and Dejean, N.
(2012). Routing Metrics Used for Path Calculation in
Low-Power and Lossy Networks. RFC 6551.
Contiki-Ng (2004). contiki-ng/contiki-ng. [accessed 13-
July-2021].
Dunkels, A., Eriksson, J., Finne, N., and Tsiftes, N. (2011).
Powertrace: Network-level power profiling for low-
power wireless networks.
Gnawali, O. and Levis, P. (2012). The minimum rank with
hysteresis objective function. RFC 6719.
Jamil, M. Z., Khan, D., Saleem, A., Mehmood, K., and
Iqbal, A. (2019). Comparative performance analysis
of rpl for low power and lossy networks based on dif-
ferent objective functions. International Journal of
Advanced Computer Science and Applications, 10(5).
Karkazis, P., Leligou, H. C., Sarakis, L., Zahariadis, T.,
Trakadas, P., Velivassaki, T. H., and Capsalis, C.
(2012). Design of primary and composite routing met-
rics for rpl-compliant wireless sensor networks. In
2012 international conference on telecommunications
and multimedia (TEMU), pages 13–18. IEEE.
Kechiche, I., Bousnina, I., and Samet, A. (2017). A compar-
ative study of rpl objective functions. In 2017 Sixth In-
ternational Conference on Communications and Net-
working (ComNet), pages 1–6. IEEE.
Kim, H.-S., Ko, J., Culler, D. E., and Paek, J. (2017). Chal-
lenging the ipv6 routing protocol for low-power and
lossy networks (rpl): A survey. IEEE Communica-
tions Surveys & Tutorials, 19(4):2502–2525.
Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., and Chai,
M. (2013). The impact of rank attack on network
topology of routing protocol for low-power and lossy
networks. IEEE Sensors Journal, 13(10):3685–3692.
Mardini, W., Aljawarneh, S., Al-Abdi, A., and Taamneh, H.
(2018). Performance evaluation of rpl objective func-
tions for different sending intervals. In 2018 6th Inter-
national Symposium on Digital Forensic and Security
(ISDFS), pages 1–6.
Mayzaud, A., Badonnel, R., and Chrisment, I. (2016). A
taxonomy of attacks in rpl-based internet of things. I.
J. Network Security, 18:459–473.
Onwuegbuzie, I. U., Razak, S. A., and Isnin, I. F.
(2020). Control messages overhead impact on desti-
nation oriented directed acyclic grapha wireless sen-
sor networks objective functions performance com-
parison. Journal of Computational and Theoretical
Nanoscience, 17(2-3):1227–1235.
Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., and
Voigt, T. (2006). Cross-level sensor network simu-
lation with cooja. In Proceedings. 2006 31st IEEE
Conference on Local Computer Networks, pages 641–
648.
Pancaroglu, D. and Sen, S. (2021). Load balancing for rpl-
based internet of things: A review. Ad Hoc Networks,
page 102491.
Perazzo, P., Vallati, C., Anastasi, G., and Dini, G. (2017).
Dio suppression attack against routing in the in-
ternet of things. IEEE Communications Letters,
21(11):2524–2527.
Pradittasnee, L. (2017). Improving performance of route
maintenance processes in rpl protocol. In 2017 9th
International Conference on Information Technology
and Electrical Engineering (ICITEE), pages 1–6.
Qasem, M., Altawssi, H., Yassien, M. B., and Al-Dubai,
A. (2015). Performance evaluation of rpl objective
functions. In 2015 IEEE International Conference on
Computer and Information Technology; Ubiquitous
Computing and Communications; Dependable, Auto-
nomic and Secure Computing; Pervasive Intelligence
and Computing, pages 1606–1613.
Semedo, F., Moradpoor, N., and Rafiq, M. (2018). Vulner-
ability assessment of objective function of rpl proto-
col for internet of things. In Proceedings of the 11th
International Conference on Security of Information
and Networks, pages 1–6.
Sousa, N., Sobral, J. V., Rodrigues, J. J., Rab
ˆ
elo, R. A.,
and Solic, P. (2017). Eraof: A new rpl protocol ob-
jective function for internet of things applications. In
2017 2nd International Multidisciplinary Conference
on Computer and Energy Science (SpliTech), pages 1–
5. IEEE.
Statistica (2016). Internet of things (iot) connected de-
vices installed base worldwide from 2015 to 2025 (in
billions). https://www.statista.com/statistics/471264/
iot-number-of-connected-devices-worldwide/. Ac-
cessed: 2020-04-01.
Analysis of RPL Objective Functions with Security Perspective
79