A Study of RPL DODAG Version Attacks

  title={A Study of RPL DODAG Version Attacks},
  author={Anth{\'e}a Mayzaud and Anuj Sehgal and Remi Badonnel and Isabelle Chrisment and J{\"u}rgen Sch{\"o}nw{\"a}lder},
The IETF designed the Routing Protocol for Low power and Lossy Networks (RPL) as a candidate for use in constrained networks. Keeping in mind the di↵erent requirements of such networks, the protocol was designed to support multiple routing topologies, called DODAGs, constructed using di↵erent objective functions, so as to optimize routing based on divergent metrics. A DODAG versioning system is incorporated into RPL in order to ensure that the topology does not become stale and that loops are… CONTINUE READING
Highly Cited
This paper has 31 citations. REVIEW CITATIONS
16 Citations
18 References
Similar Papers


Publications citing this paper.
Showing 1-10 of 16 extracted citations


Publications referenced by this paper.
Showing 1-10 of 18 references


  • T. Cheneau
  • https://github.com/tcheneau/simpleRPL
  • 2014
1 Excerpt

Case Study of a Black Hole Attack on LoWPAN-RPL

  • K. Chugh, L. Aboubaker, J. Loo
  • Proc. of the Sixth International Conference on…
  • 2012
1 Excerpt

Similar Papers

Loading similar papers…