{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T10:05:50Z","timestamp":1771668350658,"version":"3.50.1"},"reference-count":14,"publisher":"SAGE Publications","issue":"8","license":[{"start":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T00:00:00Z","timestamp":1375315200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["FP7-ICT-2011.1.3-288879"],"award-info":[{"award-number":["FP7-ICT-2011.1.3-288879"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Swedish Institute of Computer Science","award":["FP7-ICT-2011.1.3-288879"],"award-info":[{"award-number":["FP7-ICT-2011.1.3-288879"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,8,1]]},"abstract":"<jats:p> The Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol standardized for constrained environments such as 6LoWPAN networks. Providing security in IPv6\/RPL connected 6LoWPANs is challenging because the devices are connected to the untrusted Internet and are resource constrained, the communication links are lossy, and the devices use a set of novel IoT technologies such as RPL, 6LoWPAN, and CoAP\/CoAPs. In this paper we provide a comprehensive analysis of IoT technologies and their new security capabilities that can be exploited by attackers or IDSs. One of the major contributions in this paper is our implementation and demonstration of well-known routing attacks against 6LoWPAN networks running RPL as a routing protocol. We implement these attacks in the RPL implementation in the Contiki operating system and demonstrate these attacks in the Cooja simulator. Furthermore, we highlight novel security features in the IPv6 protocol and exemplify the use of these features for intrusion detection in the IoT by implementing a lightweight heartbeat protocol. <\/jats:p>","DOI":"10.1155\/2013\/794326","type":"journal-article","created":{"date-parts":[[2013,8,22]],"date-time":"2013-08-22T21:05:09Z","timestamp":1377205509000},"page":"794326","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":364,"title":["Routing Attacks and Countermeasures in the RPL-Based Internet of Things"],"prefix":"10.1177","volume":"9","author":[{"given":"Linus","family":"Wallgren","sequence":"first","affiliation":[{"name":"SICS Swedish ICT, Isafjordsgatan 22, 16440 Kista, Stockholm, Sweden"}]},{"given":"Shahid","family":"Raza","sequence":"additional","affiliation":[{"name":"SICS Swedish ICT, Isafjordsgatan 22, 16440 Kista, Stockholm, Sweden"}]},{"given":"Thiemo","family":"Voigt","sequence":"additional","affiliation":[{"name":"SICS Swedish ICT, Isafjordsgatan 22, 16440 Kista, Stockholm, Sweden"},{"name":"Department of Information Technology, Uppsala University, \u00c5ngstr\u00f6mlaboratoriet, L\u00e4gerhyddsv\u00e4gen 1, 75237 Uppsala, Sweden"}]}],"member":"179","published-online":{"date-parts":[[2013,8,22]]},"reference":[{"key":"B3-2013-794326","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2011.5982177"},{"key":"B4-2013-794326","volume-title":"DTLS Based Security and Twowayauthentication for the Internet of Things","author":"Kothmayr T.","year":"2013"},{"key":"B5-2013-794326","first-page":"287","volume-title":"Proceeding IEEE 8th International Conference of Distributed Computing in Sensor Systems (DCOSS '12)","author":"Raza S."},{"key":"B6-2013-794326","volume-title":"Secure Communication for the Internet of Things\u2014A Comparison of Link- Layer Security and IPsec for 6LoWPAN","author":"Raza S.","year":"2012"},{"key":"B9-2013-794326","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791277"},{"key":"B12-2013-794326","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"B13-2013-794326","volume-title":"SVELTE: Real-Time Intrusion Detection in the Internetof Things","author":"Raza S.","year":"2013"},{"key":"B17-2013-794326","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322172"},{"key":"B18-2013-794326","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440950"},{"key":"B14-2013-794326","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2011.100"},{"key":"B15-2013-794326","first-page":"85","volume-title":"Proceedings of the 1st International Conference on Mobile Systems, Applications and Services","author":"Dunkels A."},{"key":"B19-2013-794326","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255595"},{"key":"B20-2013-794326","first-page":"1193","volume-title":"Proceeding of the IEEE Wireless Communications and Networking Conference (WCNC '05)","volume":"2","author":"Lazos L."},{"key":"B21-2013-794326","first-page":"259","volume-title":"Proceeding of the 3rd International Symposium on Information Processing in Sensor Networks (IPSN '04)","author":"Newsome J."}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/794326","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/794326","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/794326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T20:27:39Z","timestamp":1621196859000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/794326"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,1]]},"references-count":14,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2013,8,1]]}},"alternative-id":["10.1155\/2013\/794326"],"URL":"https:\/\/doi.org\/10.1155\/2013\/794326","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,1]]}}}