{"id":"https://openalex.org/W4226133284","doi":"https://doi.org/10.1145/3508072.3512286","title":"Security in Internet of Things: RPL Attacks Taxonomy","display_name":"Security in Internet of Things: RPL Attacks Taxonomy","publication_year":2021,"publication_date":"2021-12-15","ids":{"openalex":"https://openalex.org/W4226133284","doi":"https://doi.org/10.1145/3508072.3512286"},"language":"en","primary_location":{"id":"doi:10.1145/3508072.3512286","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508072.3512286","pdf_url":null,"source":{"id":"https://openalex.org/S4363608372","display_name":"The 5th International Conference on Future Networks &amp; Distributed Systems","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 5th International Conference on Future Networks &amp; Distributed Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035629498","display_name":"Farag Azzedin","orcid":"https://orcid.org/0000-0001-9712-439X"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Farag Azzedin","raw_affiliation_strings":["King Fahd University of Petroleum and Minerals, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"King Fahd University of Petroleum and Minerals, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028295925","display_name":"Hussah Albinali","orcid":"https://orcid.org/0000-0001-6752-6478"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Hussah Albinali","raw_affiliation_strings":["King Fahd University of Petroleum and Minerals, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"King Fahd University of Petroleum and Minerals, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5035629498"],"corresponding_institution_ids":["https://openalex.org/I134085113"],"apc_list":null,"apc_paid":null,"fwci":3.093,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.93391089,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"820","last_page":"825"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7901614904403687},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.6906306147575378},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6776423454284668},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.6685265898704529},{"id":"https://openalex.org/keywords/taxonomy","display_name":"Taxonomy (biology)","score":0.6162192821502686},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5578606128692627},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5258941054344177},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5140896439552307},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4692147970199585},{"id":"https://openalex.org/keywords/interior-gateway-protocol","display_name":"Interior gateway protocol","score":0.45180147886276245},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.42879578471183777},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.30610737204551697},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2072140872478485},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.08711585402488708}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7901614904403687},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.6906306147575378},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6776423454284668},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.6685265898704529},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.6162192821502686},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5578606128692627},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5258941054344177},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5140896439552307},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4692147970199585},{"id":"https://openalex.org/C52837422","wikidata":"https://www.wikidata.org/wiki/Q431028","display_name":"Interior gateway protocol","level":5,"score":0.45180147886276245},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.42879578471183777},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.30610737204551697},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2072140872478485},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.08711585402488708},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3508072.3512286","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508072.3512286","pdf_url":null,"source":{"id":"https://openalex.org/S4363608372","display_name":"The 5th International Conference on Future Networks &amp; Distributed Systems","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 5th International Conference on Future Networks &amp; Distributed Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W1498683758","https://openalex.org/W1982946717","https://openalex.org/W1999949961","https://openalex.org/W2020743799","https://openalex.org/W2059000310","https://openalex.org/W2097020578","https://openalex.org/W2105532535","https://openalex.org/W2150611047","https://openalex.org/W2178285720","https://openalex.org/W2217512864","https://openalex.org/W2345791392","https://openalex.org/W2520311392","https://openalex.org/W2584316671","https://openalex.org/W2596451313","https://openalex.org/W2734996534","https://openalex.org/W2744442622","https://openalex.org/W2748718078","https://openalex.org/W2754649472","https://openalex.org/W2755594459","https://openalex.org/W2766238381","https://openalex.org/W2789414100","https://openalex.org/W2793848327","https://openalex.org/W2889430088","https://openalex.org/W2898193194","https://openalex.org/W2904959125","https://openalex.org/W2940796826","https://openalex.org/W2981340892","https://openalex.org/W2996153566","https://openalex.org/W2997593273","https://openalex.org/W3005367885","https://openalex.org/W3009538157","https://openalex.org/W3023867911","https://openalex.org/W3024998606","https://openalex.org/W3097651535","https://openalex.org/W3100162332","https://openalex.org/W3122039517","https://openalex.org/W3133564241","https://openalex.org/W3210829596","https://openalex.org/W4234109393","https://openalex.org/W4249630960","https://openalex.org/W6688741434"],"related_works":["https://openalex.org/W2033347526","https://openalex.org/W2588358127","https://openalex.org/W2154478511","https://openalex.org/W4234451713","https://openalex.org/W2521264178","https://openalex.org/W3037906321","https://openalex.org/W2061699822","https://openalex.org/W3099995967","https://openalex.org/W2563040182","https://openalex.org/W2373440974"],"abstract_inverted_index":{"The":[0,26,114],"limitations":[1],"of":[2,28,57,71,78],"storage":[3],"and":[4,20,48,121],"computation":[5],"capabilities":[6],"in":[7],"IoT":[8,29],"devices":[9],"raise":[10],"challenges":[11],"to":[12,68,89,118],"design":[13],"scalable":[14],"protocols":[15,33],"for":[16,36],"different":[17],"network":[18,24],"sizes":[19],"maintain":[21],"the":[22,69,76,95],"minimum":[23],"delay.":[25],"nature":[27],"makes":[30],"existing":[31],"routing":[32,44,73],"not":[34],"suitable":[35],"IoT.":[37],"As":[38],"a":[39],"result,":[40],"IETF":[41],"introduced":[42],"IPv6":[43],"protocol":[45],"over":[46],"low-power":[47],"lossy":[49],"networks.":[50],"Unfortunately,":[51],"there":[52],"is":[53,116],"no":[54],"official":[55],"implementation":[56],"security":[58,80],"mechanisms":[59],"that":[60],"are":[61],"defined":[62],"as":[63],"standard.":[64],"This":[65,98],"gap":[66],"led":[67],"appearance":[70],"many":[72],"attacks":[74,92,103],"utilizing":[75],"absence":[77],"RPL":[79,91,102,112],"mechanisms.":[81],"In":[82],"this":[83],"article,":[84],"we":[85],"propose":[86],"novel":[87],"taxonomy":[88,99,115],"categorize":[90],"based":[93],"on":[94],"attack's":[96],"mechanism.":[97],"considers":[100],"all":[101],"whether":[104],"inherited":[105],"from":[106,110],"WSN":[107],"or":[108],"resulted":[109],"exploiting":[111],"features.":[113],"evaluated":[117],"ensure":[119],"usefulness":[120],"applicability.":[122]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
