
formance metrics, such as energy, PDR, and latency,
to demonstrate how mitigation improves network per-
formance. Furthermore, our Approach integrates both
attack analysis and mitigation into a cohesive frame-
work, offering a holistic solution for securing IoT net-
works. Table 2 provides a comparison of the dis-
cussed approaches.
7 CONCLUSION
This work analyzes the vulnerabilities of the Routing
Protocol for Low-Power and Lossy Networks (RPL),
focusing on rank-based attacks like rank increase,
rank decrease, and worst-parent attacks. We find that
rank-increase attacks raise energy consumption and
overhead, leading to network overload, while rank-
decrease attacks disrupt traffic and the RPL’s Directed
Acyclic Graph (DODAG), affecting packet delivery.
To improve security in low-power networks like
IoT, we propose a trust energy-based mitigation for
RPL, using trust energy for routing, anomaly detec-
tion, and defense. This approach enhances network
resilience against rank-based attacks, providing dy-
namic security that adapts to evolving threats. Fu-
ture work is necessary to refine and address emerging
challenges.
REFERENCES
A. Hkiri, M. Karmani, O. B. B. A. M. M. F. H. A. and
Machhout, M. (2024). Rpl-based iot networks un-
der decreased rank attack: Performance analysis in
static and mobile environments. Faculty of Sciences
of Monastir, Tunisia, and Taif University, Saudi Ara-
bia.
Airehrour, D., Gutierrez, J., and Ray, S. (2019). Sectrust-
rpl: A secure trust-aware rpl routing protocol for inter-
net of things. Future Generation Computer Systems,
93:860–876.
Algahtani, F., Tryfonas, T., and Oikonomou, G. (2021). A
reference implementation for rpl attacks using contiki-
ng and cooja. In Proceedings of the 2021 17th Interna-
tional Conference on Distributed Computing in Sen-
sor Systems (DCOSS), pages 280–286, Pafos, Cyprus.
Baccelli, E. and Philipp, M. (2013). The rpl routing protocol
for low-power and lossy networks. Technical report,
IETF RFC 6550.
Choukri, W., Lamaazi, H., and Bena, N. (2020). Rpl rank
attack detection using deep learning. In 3rd ICT Inter-
national Conference, pages 1–6.
Dahal, S. and Shrestha, P. (2020). A comprehensive survey
of trust management systems in low-power and lossy
networks. IEEE Access, 8:148484–148514.
Djedjig, N., Tandjaoui, D., Medjek, F., and Romdhani, I.
(2020). Trust-aware and cooperative routing protocol
for iot security. Journal of Information Security Ap-
plications, 52:102467.
Gelogo, Y., Caytiles, R., and Park, B. J. (2011). Threats
and security analysis for enhanced secure neighbor
discovery protocol (send) of ipv6 ndp security. In-
ternational Journal of Security, 4:179–184.
Hashemi, S. and Aliee, F. S. (2019). Dynamic and compre-
hensive trust model for iot and its integration into rpl.
Journal of Supercomputing, 75:3555–3584.
Ioulianou, P., Vassilakis, V., and Shahandashti, S. (2022).
A trust-based intrusion detection system for rpl net-
works: Detecting a combination of rank and black-
hole attacks. Journal of Cybersecurity and Privacy,
2:124–152.
Iuchi, K., Matsunaga, T., Toyoda, K., and Sasase, I. (2015).
Secure parent node selection scheme in route con-
struction to exclude attacking nodes from rpl network.
In Proc. 21st Asia–Pac. Conf. Commun. (APCC),
pages 299–303.
Liu (2021). A detection framework against cpma attack
based on trust evaluation and machine learning in iot
network. IEEE Internet of Things Journal, 8:15249–
15258.
Mayzaud, A., R
´
emi, B., and I., C. (2016). A taxonomy of
attacks in rpl-based internet of things. 18.
Raghavendra, T., Anand, M., Munuswamy, S., Kalidoss, T.,
Svn, S. K., and Arputharaj, K. (2022). An intelligent
rpl attack detection using machine learning-based in-
trusion detection system for internet of things. Proce-
dia Computer Science, 215:61–70.
Raoof, A., Ashraf, M., and Horng, L. C. (2018). Routing
attacks and mitigation methods for rpl-based internet
of things. IEEE Communications Surveys Tutorials,
pages 1–11.
Rouissat, M., Belkheir, M., Belkhira, S. A. H., Mokaddem,
A., and Ziani, D. (2023). Implementing and evalu-
ating a new silent rank attack in rpl-contiki based iot
networks. Journal of Electrical Engineering, 74:454–
462.
Said, A., Aymen, Y., Faicel, Y., and Takoua, A. (2020). Ma-
chine learning-based rank attack detection for smart
hospital infrastructure. In Proceedings of the Interna-
tional Conference.
Santos-Boada, G. and Hesselbach, X. (2019). Trust man-
agement for rpl-based networks: A comprehensive
survey. Sensors, 19(24):5385.
Simoglou, G., Violettas, G., Petridou, S., and Mamatas,
L. (2021). Intrusion detection systems for rpl secu-
rity: A comparative analysis. Computers Security,
104:102219.
Zhang, Z. and Chen, H. (2018). A survey of trust manage-
ment in the internet of things. IEEE Access, 6:76007–
76020.
Zhou, L. and Gong, H. (2014). Trust-based secure rout-
ing for rpl in low-power and lossy networks. IEEE
Transactions on Parallel and Distributed Systems,
25(9):2297–2306.
IoTBDS 2025 - 10th International Conference on Internet of Things, Big Data and Security
222