A Survey : Locating the Attacker of Wormhole Attack on RPL in IoT
Keywords:
- IoT, IEEE 802.15.4E, ROLL, 6LoWPAN, RPL, DODAG, Wormhole, Honeypot, IDSAbstract
Internet of Things (IoTs) offers capabilities to identify and connect worldwide physical objects into a
unified system. Internet of Things consists of devices which are limited in resources like battery powered, memory and
processing capabilities etc. Due to this a new network layer routing protocol is designed called RPL(Routing Protocol
for low power and lossy Network), which is a light weight protocol and its functionality differs from traditional
routing protocol. This rank based routing protocol may undergo several kinds of attack as they are connected to the
unsecured Internet, limited resources; also the communication links are lossy. This paper focuses on the possible
attack carried out on RPL, along with the comparative analysis to mitigate these attacks. Also we have focused on the
methods for providing security against wormhole attacks.