Skip to main content

Research Repository

Advanced Search

Security threats in the internet of things: RPL's attacks and countermeasures

Medjek, Faiza; Tandjaoui, Djamel; Romdhani, Imed; Djedjig, Nabil

Authors

Faiza Medjek

Djamel Tandjaoui

Imed Romdhani

Nabil Djedjig



Abstract

In the internet of things (IoT) vision, people, systems, and objects with sensing and/or actuating capabilities communicate to monitor and control the physical world. Nowadays, the IoT concept has attracted significant attention from different application domain such as healthcare and smart homes. Indeed, self-organization and self-configuration are key characteristics of IoT given that IoT represents a pervasive environment where objects are resource-constrained and communication technologies are very ubiquitous. These characteristics in addition to the vulnerability of objects themselves and of the communication channels make IoT more susceptible to malicious attacks. In this context, a deep analysis of IoT security breach and vulnerabilities is necessary. This chapter presents IoT requirements and existing threats as well as security protocols and mechanisms. It specifically analyzes existing and new threats against the IoT's routing protocol (the routing protocol for low-power and lossy networks: RPL) and presents intrusion detection solutions (IDS) to counter RPL attacks.

Citation

Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2018). Security threats in the internet of things: RPL's attacks and countermeasures. In Security and Privacy in Smart Sensor Networks (147-178). IGI Global. https://doi.org/10.4018/978-1-5225-5736-4.ch008

Publication Date May 9, 2018
Deposit Date Apr 25, 2024
Publisher IGI Global
Pages 147-178
Book Title Security and Privacy in Smart Sensor Networks
ISBN 9781522557364
DOI https://doi.org/10.4018/978-1-5225-5736-4.ch008
Public URL https://uwe-repository.worktribe.com/output/11912676