{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:05:58Z","timestamp":1776679558883,"version":"3.51.2"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T00:00:00Z","timestamp":1709337600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T00:00:00Z","timestamp":1709337600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10836-024-06106-w","type":"journal-article","created":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T20:01:33Z","timestamp":1709409693000},"page":"259-273","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Simulation-based Analysis of RPL Routing Attacks and Their Impact on IoT Network Performance"],"prefix":"10.1007","volume":"40","author":[{"given":"Raveendranadh","family":"Bokka","sequence":"first","affiliation":[]},{"given":"Tamilselvan","family":"Sadasivam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,2]]},"reference":[{"key":"6106_CR1","unstructured":"Ali H, Duquennoy S, Boldt M (2015) A Performance evaluation of RPL in Contiki. CLOSER 2015 - In: Proceedings of 5th International Conference on Cloud Computing and Services Science, Proceedings. pp 233\u2013240"},{"key":"6106_CR2","doi-asserted-by":"publisher","unstructured":"Ambarkar SS, Shekokar N (2021) Impact Analysis of RPL Attacks on 6Lo WPAN based Internet of Things network. In: Proceeding&nbsp;2021 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT) 1\u20135. IEEE. https:\/\/doi.org\/10.1109\/CONECCT52877.2021.9622711","DOI":"10.1109\/CONECCT52877.2021.9622711"},{"key":"6106_CR3","doi-asserted-by":"publisher","unstructured":"Ar\u0131\u015f A, Oktu\u011f SF (2020) Analysis of the RPL version number attack with multiple attackers. In: Proceeding 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE. https:\/\/doi.org\/10.1109\/CyberSA49311.2020.9139695","DOI":"10.1109\/CyberSA49311.2020.9139695"},{"key":"6106_CR4","doi-asserted-by":"publisher","unstructured":"Barthel D, Vasseur JP, Pister K, Kim M, Dejean N (2012) Routing metrics used for path calculation in low-power and lossy networks. https:\/\/doi.org\/10.17487\/RFC6551","DOI":"10.17487\/RFC6551"},{"key":"6106_CR5","doi-asserted-by":"publisher","unstructured":"Bokka R, Sadasivam T (2021) DIS flooding attack Impact on the Performance of RPL Based Internet of Things Networks: Analysis. In: Proceeding 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC)&nbsp;1017\u20131022 . IEEE. https:\/\/doi.org\/10.1109\/ICESC51422.2021.9532901","DOI":"10.1109\/ICESC51422.2021.9532901"},{"key":"6106_CR6","doi-asserted-by":"publisher","unstructured":"Ching TW, Aman AHM, Azamuddin WMH, Sallehuddin H, Attarbashi ZS (2020) Performance analysis of internet of things routing protocol for low power and lossy networks (RPL): energy, overhead and packet delivery. In: Proceeding 2021 3rd International Cyber Resilience Conference (CRC) 1\u20136. IEEE. https:\/\/doi.org\/10.1109\/CRC50527.2021.9392475","DOI":"10.1109\/CRC50527.2021.9392475"},{"key":"6106_CR7","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/841267","volume":"2015","author":"USRK Dhamodharan","year":"2015","unstructured":"Dhamodharan USRK, Vayanaperumal R (2015) Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. Sci World J 2015:841267. https:\/\/doi.org\/10.1155\/2015\/841267","journal-title":"Sci World J"},{"issue":"14","key":"6106_CR8","doi-asserted-by":"publisher","first-page":"3163","DOI":"10.1016\/j.comnet.2012.06.016","volume":"56","author":"O Gaddour","year":"2012","unstructured":"Gaddour O, Koubaa A (2012) RPL in a nutshell: A survey. Comput Netw 56(14):3163\u20133178. https:\/\/doi.org\/10.1016\/j.comnet.2012.06.016","journal-title":"Comput Netw"},{"issue":"2","key":"6106_CR9","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S0164-1212(02)00092-4","volume":"67","author":"G Helmer","year":"2003","unstructured":"Helmer G, Wong JS, Honavar V, Miller L, Wang Y (2003) Lightweight agents for intrusion detection. J&nbsp;Syst&nbsp;Softw 67(2):109\u2013122. https:\/\/doi.org\/10.1016\/S0164-1212(02)00092-4","journal-title":"J&nbsp;Syst&nbsp;Softw"},{"key":"6106_CR10","doi-asserted-by":"publisher","unstructured":"Hkiri A, Karmani M, Machhout M (2022) The routing protocol for low power and lossy networks (RPL) under attack: simulation and analysis. In: 2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET)&nbsp;,143\u2013148. IEEE. https:\/\/doi.org\/10.1109\/IC_ASET53395.2022.9765901","DOI":"10.1109\/IC_ASET53395.2022.9765901"},{"key":"6106_CR11","doi-asserted-by":"publisher","unstructured":"Le A, Loo J, Luo Y, Lasebae A (2013) July The impacts of internal threats towards routing protocol for low power and lossy network performance. In: 2013 IEEE symposium on computers and communications (ISCC)&nbsp;,000789-000794. IEEE. https:\/\/doi.org\/10.1109\/ISCC.2013.6755045","DOI":"10.1109\/ISCC.2013.6755045"},{"issue":"2","key":"6106_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1504\/IJSNET.2020.104923","volume":"32","author":"S Luangoudom","year":"2020","unstructured":"Luangoudom S, Tran D, Nguyen T, Tran HA, Nguyen G, Ha QT (2020) svBLOCK: Mitigating black hole attack in low-power and lossy networks. Int J Sens Netw 32(2):77\u201386. https:\/\/doi.org\/10.1504\/IJSNET.2020.104923","journal-title":"Int J Sens Netw"},{"key":"6106_CR13","unstructured":"Mainetti L, Patrono L, Vilei A (2011) Evolution of wireless sensor networks towards the internet of things: A survey. In: SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks&nbsp;, 1\u20136. IEEE"},{"key":"6106_CR14","unstructured":"Network Simulator, NetSim, Emulator, 5G, Military Communication, Vehicular networks. Accessed 7 Jan 2022. https:\/\/www.tetcos.com\/"},{"issue":"4","key":"6106_CR15","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.12928\/telkomnika.v18i4.15768","volume":"18","author":"BH Patel","year":"2020","unstructured":"Patel BH, Shah P (2020) RPL routing protocol performance under sinkhole and selective forwarding attack: experimental and simulated evaluation. TELKOMNIKA (Telecommunication Computing Electronics and Control) 18(4):1849\u20131856. https:\/\/doi.org\/10.12928\/telkomnika.v18i4.15768","journal-title":"TELKOMNIKA (Telecommunication Computing Electronics and Control)"},{"issue":"11","key":"6106_CR16","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1109\/LCOMM.2017.2738629","volume":"21","author":"P Perazzo","year":"2017","unstructured":"Perazzo P, Vallati C, Anastasi G, Dini G (2017) DIO suppression attack against routing in the Internet of Things. IEEE Commun Lett 21(11):524\u20132527. https:\/\/doi.org\/10.1109\/LCOMM.2017.2738629","journal-title":"IEEE Commun Lett"},{"issue":"2","key":"6106_CR17","doi-asserted-by":"publisher","first-page":"1582","DOI":"10.1109\/COMST.2018.2885894","volume":"21","author":"A Raoof","year":"2018","unstructured":"Raoof A, Matrawy A, Lung CH (2018) Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Commun&nbsp;Surv&nbsp;Tutor 21(2):1582\u20131606. https:\/\/doi.org\/10.1109\/COMST.2018.2885894","journal-title":"IEEE Commun&nbsp;Surv&nbsp;Tutor"},{"issue":"12","key":"6106_CR18","doi-asserted-by":"publisher","first-page":"11536","DOI":"10.1109\/JIOT.2020.3022276","volume":"7","author":"A Raoof","year":"2020","unstructured":"Raoof A, Matrawy A, Lung CH (2020) Enhancing routing security in IoT: Performance evaluation of RPL\u2019s secure mode under attacks. IEEE Internet Things J 7(12):11536\u201311546. https:\/\/doi.org\/10.1109\/JIOT.2020.3022276","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"6106_CR19","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2023","unstructured":"Raza S, Wallgren L, Voigt T (2023) SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Netw 11(8):2661\u20132674. https:\/\/doi.org\/10.1016\/j.adhoc.2013.04.014","journal-title":"Ad Hoc Netw"},{"key":"6106_CR20","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9324035","author":"P Sethi","year":"2017","unstructured":"Sethi P, Sarangi SR (2017) Internet of things: architectures, protocols, and applications. J Electr Comput Eng. https:\/\/doi.org\/10.1155\/2017\/9324035","journal-title":"J Electr Comput Eng"},{"key":"6106_CR21","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.comcom.2022.10.014","volume":"197","author":"G Sharma","year":"2023","unstructured":"Sharma G, Grover J, Verma A (2023) Performance evaluation of mobile RPL-based IoT networks under version number attack. Comput Commun 197:12\u201322. https:\/\/doi.org\/10.1016\/j.comcom.2022.10.014","journal-title":"Comput Commun"},{"key":"6106_CR22","unstructured":"Singh G, Cheema AK, Kapoor N (2017) Performance evaluation of routing protocol in Internet of Things using Netsim.&nbsp;Int J Adv Comput Res&nbsp;8(3). http:\/\/ijarcs.info\/index.php\/Ijarcs\/article\/view\/3114"},{"issue":"4","key":"6106_CR23","first-page":"16","volume":"4","author":"R Stephen","year":"2007","unstructured":"Stephen R, Arockiam L (2007) Intrusion detection system to detect sinkhole attack on RPL protocol in Internet of Things. International Journal of Electrical Electronics and Computer Science 4(4):16\u201320","journal-title":"International Journal of Electrical Electronics and Computer Science"},{"issue":"2","key":"6106_CR24","first-page":"4093","volume":"7","author":"YT Tonapa","year":"2020","unstructured":"Tonapa YT, Wahidah I, Karna NBA (2020) Performance Testing Of Routing Protocol For Low Power And Lossy Networks (rpl) Against Attack Using Cooja Simulator. eProceedings of Engineering 7(2):4093\u20134101","journal-title":"eProceedings of Engineering"},{"issue":"8","key":"6106_CR25","doi-asserted-by":"publisher","first-page":"43","DOI":"10.14257\/ijgdc.2018.11.8.05","volume":"11","author":"A Verma","year":"2018","unstructured":"Verma A, Ranga V (2018) Analysis of routing attacks on RPL based 6LoWPAN networks. Int J Grid Distrib&nbsp;Comput 11(8):43\u201356. https:\/\/doi.org\/10.14257\/ijgdc.2018.11.8.05","journal-title":"Int J Grid Distrib&nbsp;Comput"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06106-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-024-06106-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06106-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T13:12:22Z","timestamp":1718889142000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-024-06106-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,2]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["6106"],"URL":"https:\/\/doi.org\/10.1007\/s10836-024-06106-w","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"value":"0923-8174","type":"print"},{"value":"1573-0727","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,2]]},"assertion":[{"value":"14 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent of Publication"}},{"value":"The authors declare that they have no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"The authors declare that they have no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}