loading page

Investigating Routing Protocol Attack for Low Power and Lossy IoT Networks
  • Usha Kiran,
  • Poonam Maurya,
  • Himanshu Sharma
Usha Kiran
Indian Institute of Technology Bhilai

Corresponding Author:[email protected]

Author Profile
Poonam Maurya
Aalborg Universitet Kobenhavn
Author Profile
Himanshu Sharma
Krishna Institute of Engineering & Technology
Author Profile


Internet-of-Things (IoT) networks are characterized by low-powered nodes with limited computational power and storage capacity. Consequently, protocols dedicated to Low Power and Lossy networks (LLNs) are designed to support communication in such resource-constrained nodes. One such protocol is Routing Protocol for Low-Power and lossy networks (RPL) which builds and maintains routes in RPL-based networks, leading to optimized routing and lower network overhead. However, the RPL-based protocol has several internal and external vulnerabilities that must be explored and addressed. Therefore, the present study illustrates the impact of several RPL-based attacks, including DIS attack, version number attack, decreased rank attack, and WPS attack, by employing the Contiki Cooja network simulator with specific simulation scenarios. In addition, we conduct a comparative analysis of the RPL-based attacks and find that the WPS attack results in the highest packet loss rate of 26%, whereas the DIS attack, version number attack, and rank attack result in packet loss rates of 17%, 15%, and 13%, respectively.