{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T23:24:34Z","timestamp":1778023474176,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1145\/3508072.3512286","type":"proceedings-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T17:01:56Z","timestamp":1649869316000},"page":"820-825","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Security in Internet of Things: RPL Attacks Taxonomy"],"prefix":"10.1145","author":[{"given":"Farag","family":"Azzedin","sequence":"first","affiliation":[{"name":"King Fahd University of Petroleum and Minerals, Saudi Arabia"}]},{"given":"Hussah","family":"Albinali","sequence":"additional","affiliation":[{"name":"King Fahd University of Petroleum and Minerals, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"What is the internet of things (iot)?Retrieved","year":"2022","unstructured":"2021. What is the internet of things (iot)?Retrieved January 7, 2022 from https:\/\/www.oracle.com\/sa\/internet-of-things\/what-is-iot\/ 2021. What is the internet of things (iot)?Retrieved January 7, 2022 from https:\/\/www.oracle.com\/sa\/internet-of-things\/what-is-iot\/"},{"key":"e_1_3_2_1_2_1","volume-title":"26th International Telecommunication Networks and Applications Conference, ITNAC 2016 (2017","author":"Airehrour David","year":"2017","unstructured":"David Airehrour , Jairo Gutierrez , and Sayan\u00a0Kumar Ray . 2017 . Securing RPL routing protocol from blackhole attacks using a trust-based mechanism . 26th International Telecommunication Networks and Applications Conference, ITNAC 2016 (2017 ), 115\u2013120. https:\/\/doi.org\/10.1109\/ATNAC.2016.7878793 10.1109\/ATNAC.2016.7878793 David Airehrour, Jairo Gutierrez, and Sayan\u00a0Kumar Ray. 2017. Securing RPL routing protocol from blackhole attacks using a trust-based mechanism. 26th International Telecommunication Networks and Applications Conference, ITNAC 2016 (2017), 115\u2013120. https:\/\/doi.org\/10.1109\/ATNAC.2016.7878793"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.18080\/jtde.v5n1.88"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8080028"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10186472"},{"key":"e_1_3_2_1_6_1","volume-title":"SECURWARE 2012 - 6th International Conference on Emerging Security Information, Systems and Technologiesc","author":"Chugh Karishma","year":"2012","unstructured":"Karishma Chugh , Aboubaker Lasebae , and Jonathan Loo . 2012 . Case study of a black hole attack on 6LoWPAN-RPL . SECURWARE 2012 - 6th International Conference on Emerging Security Information, Systems and Technologiesc (2012), 157\u2013162. Karishma Chugh, Aboubaker Lasebae, and Jonathan Loo. 2012. Case study of a black hole attack on 6LoWPAN-RPL. SECURWARE 2012 - 6th International Conference on Emerging Security Information, Systems and Technologiesc (2012), 157\u2013162."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2019.02.292"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.06.016"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.2017070102"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2992449"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2878151"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841543"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2013.07.001"},{"key":"e_1_3_2_1_14_1","volume-title":"The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams. Internet Engineering Task Force (IETF)March","author":"Hui P\u00a0Vasseur J","year":"2012","unstructured":"J P\u00a0Vasseur J Hui . 2012. The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams. Internet Engineering Task Force (IETF)March ( 2012 ). JP\u00a0Vasseur J Hui. 2012. The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams. Internet Engineering Task Force (IETF)March (2012)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETIICT.2017.7977006"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2013.6614801"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2751617"},{"key":"e_1_3_2_1_18_1","first-page":"4","article-title":"Specification-based IDS for securing RPL from topology attacks","volume":"1","author":"Le Anhtuan","year":"2011","unstructured":"Anhtuan Le , Jonathan Loo , Yuan Luo , and Aboubaker Lasebae . 2011 . Specification-based IDS for securing RPL from topology attacks . IFIP Wireless Days 1 , 1 (2011), 4 \u2013 6 . https:\/\/doi.org\/10.1109\/WD.2011.6098218 10.1109\/WD.2011.6098218 Anhtuan Le, Jonathan Loo, Yuan Luo, and Aboubaker Lasebae. 2011. Specification-based IDS for securing RPL from topology attacks. IFIP Wireless Days 1, 1 (2011), 4\u20136. https:\/\/doi.org\/10.1109\/WD.2011.6098218","journal-title":"IFIP Wireless Days"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2013.6755045"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of 2017 International Conference on Intelligent Computing and Control, I2C2 2017 2018-Janua (2018","author":"Mangelkar Smitesh","year":"2018","unstructured":"Smitesh Mangelkar , Sudhir\u00a0 N. Dhage , and Anant\u00a0 V. Nimkar . 2018 . A comparative study on RPL attacks and security solutions . Proceedings of 2017 International Conference on Intelligent Computing and Control, I2C2 2017 2018-Janua (2018 ), 1\u20136. https:\/\/doi.org\/10.1109\/I2C2.2017.8321851 10.1109\/I2C2.2017.8321851 Smitesh Mangelkar, Sudhir\u00a0N. Dhage, and Anant\u00a0V. Nimkar. 2018. A comparative study on RPL attacks and security solutions. Proceedings of 2017 International Conference on Intelligent Computing and Control, I2C2 2017 2018-Janua (2018), 1\u20136. https:\/\/doi.org\/10.1109\/I2C2.2017.8321851"},{"key":"e_1_3_2_1_21_1","first-page":"459","article-title":"A Taxonomy of Attacks in RPL-based Internet of Things","volume":"18","author":"Mayzaud Anth\u00e9a","year":"2016","unstructured":"Anth\u00e9a Mayzaud , R\u00e9mi Badonnel , and Isabelle Chrisment . 2016 . A Taxonomy of Attacks in RPL-based Internet of Things . International Journal of Network Security 18 , 3 (2016), 459 \u2013 473 . https:\/\/hal.inria.fr\/hal-01207859 Anth\u00e9a Mayzaud, R\u00e9mi Badonnel, and Isabelle Chrisment. 2016. A Taxonomy of Attacks in RPL-based Internet of Things. International Journal of Network Security 18, 3 (2016), 459\u2013473. https:\/\/hal.inria.fr\/hal-01207859","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43862-6_12"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPS.2015.7244960"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/971545"},{"key":"e_1_3_2_1_25_1","volume-title":"A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-based Approaches","author":"Muzammal M.","year":"2020","unstructured":"Syeda\u00a0 M. Muzammal , Raja\u00a0Kumar Murugesan , and N.\u00a0 Z. Jhanjhi . 2020. A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-based Approaches . IEEE Internet of Things Journal 4662, c ( 2020 ), 1\u20131. https:\/\/doi.org\/10.1109\/jiot.2020.3031162 10.1109\/jiot.2020.3031162 Syeda\u00a0M. Muzammal, Raja\u00a0Kumar Murugesan, and N.\u00a0Z. Jhanjhi. 2020. A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-based Approaches. IEEE Internet of Things Journal 4662, c (2020), 1\u20131. https:\/\/doi.org\/10.1109\/jiot.2020.3031162"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.gltp.2021.01.012"},{"key":"e_1_3_2_1_27_1","unstructured":"P. Levis; T. Clausen J. Hui O. Gnawali and J. Ko. 2011. The Trickle Algorithm. Internet Engineering Task Force (IETF)(2011). arXiv:arXiv:1011.1669v3http:\/\/www.rfc-editor.org\/info\/rfc6206.  P. Levis; T. Clausen J. Hui O. Gnawali and J. Ko. 2011. The Trickle Algorithm. Internet Engineering Task Force (IETF)(2011). arXiv:arXiv:1011.1669v3http:\/\/www.rfc-editor.org\/info\/rfc6206."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2738629"},{"key":"e_1_3_2_1_29_1","volume-title":"Antonio Arena, Giuseppe Anastasi, and Gianluca Dini.","author":"Perazzo Pericle","year":"2017","unstructured":"Pericle Perazzo , Carlo Vallati , Antonio Arena, Giuseppe Anastasi, and Gianluca Dini. 2017 . An implementation and evaluation of the security features of RPL. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10517 LNCS, November(2017), 63\u201376. https:\/\/doi.org\/10.1007\/978-3-319-67910-5_6 10.1007\/978-3-319-67910-5_6 Pericle Perazzo, Carlo Vallati, Antonio Arena, Giuseppe Anastasi, and Gianluca Dini. 2017. An implementation and evaluation of the security features of RPL. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10517 LNCS, November(2017), 63\u201376. https:\/\/doi.org\/10.1007\/978-3-319-67910-5_6"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2018.8301614"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2971463"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2885894"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013120"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Ahmed Raoof Ashraf Matrawy and Chung-Horng Lung. 2020. Enhancing Routing Security in IoT: Performance Evaluation of RPL Secure Mode under Attacks. arXiv preprint arXiv:2004.07815(2020).  Ahmed Raoof Ashraf Matrawy and Chung-Horng Lung. 2020. Enhancing Routing Security in IoT: Performance Evaluation of RPL Secure Mode under Attacks. arXiv preprint arXiv:2004.07815(2020).","DOI":"10.1109\/GLOBECOM38437.2019.9013120"},{"key":"e_1_3_2_1_35_1","volume-title":"X","author":"Raoof Ahmed","year":"2021","unstructured":"Ahmed Raoof , Student Member , Chung-horng Lung, and Senior Member . 2021. Securing RPL using Network Coding : The Chained Secure Mode (CSM). XX , X ( 2021 ), 1\u201310. Ahmed Raoof, Student Member, Chung-horng Lung, and Senior Member. 2021. Securing RPL using Network Coding : The Chained Secure Mode (CSM). XX, X (2021), 1\u201310."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Abdul Rehman and M\u00a0Ali Lodhi. 2016. Rank Attack using Objective Function in RPL for Low Power and Lossy Networks. (2016).  Abdul Rehman and M\u00a0Ali Lodhi. 2016. Rank Attack using Objective Function in RPL for Low Power and Lossy Networks. (2016).","DOI":"10.1109\/ICCSII.2016.7462418"},{"key":"e_1_3_2_1_37_1","volume-title":"Article 1","author":"Saleem Jibran","year":"2018","unstructured":"Jibran Saleem , Mohammad Hammoudeh , Umar Raza , Bamidele Adebisi , and Ruth Ande . 2018. IoT Standardisation: Challenges, Perspectives and Solution ., Article 1 ( 2018 ), 9\u00a0pages. https:\/\/doi.org\/10.1145\/3231053.3231103 10.1145\/3231053.3231103 Jibran Saleem, Mohammad Hammoudeh, Umar Raza, Bamidele Adebisi, and Ruth Ande. 2018. IoT Standardisation: Challenges, Perspectives and Solution., Article 1 (2018), 9\u00a0pages. https:\/\/doi.org\/10.1145\/3231053.3231103"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2014.6934253"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2014.6934253"},{"key":"e_1_3_2_1_40_1","first-page":"692","article-title":"Impact factor: 4.295 A Detailed Classification of Routing Attacks against RPL in Internet of Things","volume":"3","author":"Sr Assistant Professor Divya Sharma","year":"2017","unstructured":"Divya Sharma Sr Assistant Professor , Ishani Mishra Sr Assistant Professor , and Sanjay Jain . 2017 . Impact factor: 4.295 A Detailed Classification of Routing Attacks against RPL in Internet of Things . International Journal of Advance Research 3 (2017), 692 \u2013 703 . www.ijariit.com Divya Sharma Sr Assistant Professor, Ishani Mishra Sr Assistant Professor, and Sanjay Jain. 2017. Impact factor: 4.295 A Detailed Classification of Routing Attacks against RPL in Internet of Things. International Journal of Advance Research 3 (2017), 692\u2013703. www.ijariit.com","journal-title":"International Journal of Advance Research"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2016.7566473"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2020.622"},{"key":"e_1_3_2_1_43_1","volume-title":"\u201cDIO Suppression Attack Against Routing in the Internet of Things\u201d. TechRxiv","author":"Verma Abhishek","year":"2019","unstructured":"Abhishek Verma and Virender Ranga . 2019. Comment on \u201cDIO Suppression Attack Against Routing in the Internet of Things\u201d. TechRxiv ( 2019 ). https:\/\/doi.org\/10.1109\/LCOMM.2017.2738629 10.1109\/LCOMM.2017.2738629 Abhishek Verma and Virender Ranga. 2019. Comment on \u201cDIO Suppression Attack Against Routing in the Internet of Things\u201d. TechRxiv (2019). https:\/\/doi.org\/10.1109\/LCOMM.2017.2738629"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3802"},{"key":"e_1_3_2_1_45_1","volume-title":"The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things. Computing","author":"Verma Abhishek","year":"2020","unstructured":"Abhishek Verma and Virender Ranga . 2020. The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things. Computing ( 2020 ). https:\/\/doi.org\/10.1007\/s00607-020-00862-1 10.1007\/s00607-020-00862-1 Abhishek Verma and Virender Ranga. 2020. The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things. Computing (2020). https:\/\/doi.org\/10.1007\/s00607-020-00862-1"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-03028-9"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07421-z"}],"event":{"name":"ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems","location":"Dubai United Arab Emirates","acronym":"ICFNDS 2021"},"container-title":["The 5th International Conference on Future Networks &amp; Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3512286","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508072.3512286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:31Z","timestamp":1750191151000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3512286"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":47,"alternative-id":["10.1145\/3508072.3512286","10.1145\/3508072"],"URL":"https:\/\/doi.org\/10.1145\/3508072.3512286","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]},"assertion":[{"value":"2022-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}