Fortifying RPL-Based 6LoWPAN in IoT: A Comprehensive Review of Emerging Attack Vectors and Defense Mechanisms using Machine Learning

Authors

DOI:

https://doi.org/10.4108/eetiot.9694

Keywords:

Routing Protocol for Low-power and Lossy Networks (RPL), Internet of Things (IoT), IPv6 Over Low-power Wireless Personal Area Network (6LoWPAN) protocol, Multiple Attacks, Security Mechanism, Routing Protocols

Abstract

Internet of Things (IoT) is a system of interconnected digital tools, including sensing elements and communication modules, that enables seamless data transfer over the Internet. These devices, though, run with resource limitations in terms of power, memory, and computational capabilities. Therefore, scientists created the IPv6 Over Low-power Wireless Personal Area Network (6LoWPAN) protocol, which allows for wireless communication among IoT devices while ensuring efficient use of resources. The Internet Engineering Task Force (IETF) has formally ratified 6LoWPAN, and its ROLL working group presented the Routing Protocol for Low-power and Lossy Networks (RPL), standardized as IETF RFC 6550, as a fundamental part of the 6LoWPAN stack. Although beneficial, RPL-based routing within IoT networks is particularly exposed to various security risks. This survey offers an in-depth overview of RPL-specific attacks and their defense mechanisms, as published in top-tier journals between 2015 and 2025. Based on a conceptual analysis of routing-based attacks in RPL, we introduce a new attack taxonomy that categorizes these attacks into 12 fundamental categories based on intrinsic features and behavior. Furthermore, we discuss the impact of every attack on network performance and describe actual cases in which these vulnerabilities have been targeted. Aside from attack classification, this survey proposes a novel taxonomy of defense mechanisms that categorizes them into 8 fundamental categories depending on their strategic method of routing attack mitigation. Every defense method is extensively studied concerning its applicability in actual IoT implementations. Furthermore, we critically study and evaluate different evaluation platforms, such as testbeds and simulators, used in investigating RPL-based security attacks and countermeasures, highlighting their applicability and usefulness in real-world environments. Lastly, we identify open research challenges by examining current literature gaps and outline future research opportunities for both researchers and practitioners. In addition, the survey notes a clear shift toward sequence-based and graph-driven learning models, supported by optimization with meta-heuristic techniques, which increasingly guide the design of modern IDS frameworks for RPL-enabled IoT networks. Our research is intended to offer valuable understanding and a strong platform for investigators to create more efficient security measures in response to evolving RPL-based attacks in the IoT environment.

Downloads

Download data is not yet available.

References

[1] H. Albinali and F. Azzedin, “Replay attacks in RPL-based Internet of Things: Comparative and empirical study,” Comput. Networks, vol. 257, p. 110996, 2025.

[2] A. K. Prajapati, E. S. Pilli, R. B. Battula, V. Varadharajan, A. Verma, and R. C. Joshi, “A comprehensive survey on RPL routing-based attacks, defences and future directions in Internet of Things,” Comput. Electr. Eng., vol. 123, p. 110071, 2025.

[3] N. A. Alfriehat, M. Anbar, S. Karuppayah, S. D. A. Rihan, B. A. Alabsi, and A. M. Momani, “Detecting version number attacks in low power and lossy networks for internet of things routing: review and taxonomy,” IEEE Access, vol. 12, pp. 31136–31158, 2024.

[4] H. Albinali and F. Azzedin, “Toward RPL attacks and mitigation taxonomy: Systematic literature review approach,” IEEE Trans. Netw. Serv. Manag., vol. 21, no. 5, pp. 5215–5238, 2024.

[5] A. Bang and U. P. Rao, “Impact analysis of rank attack on RPL-based 6LoWPAN networks in Internet of Things and aftermaths,” Arab. J. Sci. Eng., vol. 48, no. 2, pp. 2489–2505, 2023.

[6] Z. A. Almusaylim, A. Alhumam, and N. Z. Jhanjhi, “Proposing a secure RPL based internet of things routing protocol: A review,” Ad Hoc Networks, vol. 101, p. 102096, 2020.

[7] N. Alfriehat et al., “RPL-based attack detection approaches in IoT networks: review and taxonomy,” Artif. Intell. Rev., vol. 57, no. 9, p. 248, 2024.

[8] A. Verma and V. Ranga, “Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review,” IEEE Sens. J., vol. 20, no. 11, pp. 5666–5690, 2020.

[9] A. M. Pasikhani, J. A. Clark, P. Gope, and A. Alshahrani, “Intrusion detection systems in RPL-based 6LoWPAN: A systematic literature review,” IEEE Sens. J., vol. 21, no. 11, pp. 12940–12968, 2021.

[10] K. Mittal and P. K. Batra, “A Study on Intrusion Detection System for RPL Protocol Attacks in Internet of Things,” in Network Optimization in Intelligent Internet of Things Applications, Chapman and Hall/CRC, 2024, pp. 173–193.

[11] H. Kharrufa, H. A. A. Al-Kashoash, and A. H. Kemp, “RPL-based routing protocols in IoT applications: A review,” IEEE Sens. J., vol. 19, no. 15, pp. 5952–5967, 2019.

[12] K. Avila, D. Jabba, and J. Gomez, “Security aspects for RPL-based protocols: A systematic review in IoT,” Appl. Sci., vol. 10, no. 18, p. 6472, 2020.

[13] D. Pancaroglu and S. Sen, “Load balancing for RPL-based Internet of Things: A review,” Ad Hoc Networks, vol. 116, p. 102491, 2021.

[14] M. M. Mazlan, N. A. Zakaria, and Z. Z. Abidin, “Security challenges in 6lowpan protoco l for internet of things: a review,” J. Theor. Appl. Inf. Technol, vol. 98, no. 23, pp. 3898–3908, 2020.

[15] P. S. Nandhini, S. Kuppuswami, S. Malliga, and Rjtj. DeviPriya, “Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers,” J. Supercomput., vol. 79, no. 6, pp. 6825–6848, 2023.

[16] M. Osman, J. He, F. Mahiuob, M. Mokbal, and N. Zhu, “Artificial neural network model for decreased rank attack detection in RPL based on IoT networks,” Int. J. Netw. Secur., vol. 23, no. 3, pp. 496–503, 2021.

[17] H. Albinali, R. Alghofaili, and F. Azzedin, “Analytical study of local repair attack on RPL-based 6LoWPAN networks in internet of things,” in Proceedings of the 7th international conference on future networks and distributed systems, 2023, pp. 641–646.

[18] M. Rouissat, I. S. Alsukayti, M. Belkheir, M. Alreshoodi, A. Mokaddem, and D. Ziani, “A Simple Approach for Mitigating a New Flooding Attack in RPL-Based IoT Networks,” IEEE Access, 2025.

[19] E. Canbalaban and S. Sen, “A cross-layer intrusion detection system for RPL-based Internet of Things,” in International conference on Ad-hoc networks and wireless, Springer, 2020, pp. 214–227.

[20] F. Azzedin, “Mitigating denial of service attacks in rpl-based iot environments: trust-based approach,” IEEE Access, vol. 11, pp. 129077–129089, 2023.

[21] C. Kim, C. So-In, Y. Kongsorot, and P. Aimtongkham, “FLSec-RPL: a fuzzy logic-based intrusion detection scheme for securing RPL-based IoT networks against DIO neighbor suppression attacks,” Cybersecurity, vol. 7, no. 1, p. 27, 2024.

[22] S. Al-Sarawi, M. Anbar, B. A. Alabsi, M. A. Aladaileh, and S. D. A. Rihan, “Passive rule-based approach to detect sinkhole attack in RPL-based Internet of Things networks,” IEEE Access, vol. 11, pp. 94081–94093, 2023.

[23] A. Krari and A. Hajami, “RPL-shield: A deep learning GNN-based approach for protecting IoT networks from RPL routing table falsification attacks,” in International Conference on Digital Technologies and Applications, Springer, 2024, pp. 117–127.

[24] C. D. Morales-Molina et al., “A dense neural network approach for detecting clone id attacks on the rpl protocol of the iot,” Sensors, vol. 21, no. 9, p. 3173, 2021.

[25] S. M. H. Mirshahjafari and B. S. Ghahfarokhi, “Sinkhole+ CloneID: A hybrid attack on RPL performance and detection method,” Inf. Secur. J. A Glob. Perspect., vol. 28, no. 4–5, pp. 107–119, 2019.

[26] A. Verma and V. Ranga, “CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis,” Telecommun. Syst., vol. 75, no. 1, pp. 43–61, 2020.

[27] N. Chinnakali, “Sniffing Attack Detection in 6LoWPAN RPL Networks Using Machine Learning Algorithms,” 2024.

[28] S. Goel, A. Verma, and V. K. Jain, “Design and Implementation of a Lightweight Mitigation Solution for Addressing Network Partitioning Attack Against RPL Protocol,” Wirel. Pers. Commun., vol. 139, no. 4, pp. 2027–2050, 2024.

[29] H. Azzaoui, A. Z. E. Boukhamla, P. Perazzo, M. Alazab, and V. Ravi, “A lightweight cooperative intrusion detection system for rpl-based iot,” Wirel. Pers. Commun., vol. 134, no. 4, pp. 2235–2258, 2024.

[30] A. Kannan, M. Selvi, S. V. N. Santhosh Kumar, K. Thangaramya, and S. Shalini, “Machine learning based intelligent rpl attack detection system for iot networks,” in Advanced Machine Learning with Evolutionary and Metaheuristic Techniques, Springer, 2024, pp. 241–256.

[31] M. Osman, J. He, N. Zhu, and F. M. M. Mokbal, “An ensemble learning framework for the detection of RPL attacks in IoT networks based on the genetic feature selection approach,” Ad Hoc Networks, vol. 152, p. 103331, 2024.

[32] A. Wakili, S. Bakkali, and A. E. H. Alaoui, “Machine learning for QoS and security enhancement of RPL in IoT-Enabled wireless sensors,” Sensors Int., vol. 5, p. 100289, 2024.

[33] M. Lmkaiti, M. Lachgar, I. Larhlimi, H. Moudni, and H. Mouncif, “Secure Optimization of RPL Routing in IoT Networks: Analysis of Metaheuristic Algorithms in the Face of Attacks.,” Int. J. Adv. Comput. Sci. Appl., vol. 16, no. 4, 2025.

[34] A. Berguiga, A. Harchay, and A. Massaoudi, “HIDS-RPL: A Hybrid Deep Learning-Based Intrusion Detection System for RPL in Internet of Medical Thing Networks,” IEEE Access, 2025.

[35] K. Ahmadi and R. Javidan, “A novel RPL defense mechanism based on trust and deep learning for internet of things,” J. Supercomput., vol. 80, no. 12, pp. 16979–17003, 2024.

[36] A. Krari, A. HAJAMI, and E. JARMOUNI, “Detecting the RPL version number attack in IoT Networks using Deep Learning Models,” Int. J. Adv. Comput. Sci. Appl., vol. 14, no. 10, 2023.

[37] Y. Al Sawafi, A. Touzene, and R. Hedjam, “Hybrid deep learning-based intrusion detection system for RPL IoT networks,” J. Sens. Actuator Networks, vol. 12, no. 2, p. 21, 2023.

[38] K. Kowsalyadevi and N. Balaji, “IoBTSec-RPL: A novel RPL attack detecting mechanism using hybrid deep learning over battlefield IoT environment,” Int. J. Comput. Netw. Appl, vol. 10, pp. 637–650, 2023.

[39] D. Dey and N. Ghosh, “iTRPL: An intelligent and trusted RPL protocol based on Multi-Agent Reinforcement Learning,” Ad Hoc Networks, vol. 163, p. 103586, 2024.

[40] M. H. Shivanajappa, R. M. Seetharamaiah, B. V. Sai, A. J. Siddegowda, and V. K. Rajuk, “An intrusion detection system againstRPL-based routing atacks for IoT networks,” Indones. J. Electr. Eng. Comput. Sci, vol. 34, pp. 1324–1335, 2024.

[41] S. Remya, M. J. Pillai, C. Arjun, S. Ramasubbareddy, and Y. Cho, “Enhancing security in LLNs using a hybrid trust-based intrusion detection system for RPL,” IEEE Access, vol. 12, pp. 58836–58850, 2024.

[42] B. Mbarek, M. Ge, and T. Pitner, “Proactive trust classification for detection of replication attacks in 6LoWPAN-based IoT,” Internet of Things, vol. 16, p. 100442, 2021.

[43] S. Goel, A. Verma, and V. K. Jain, “CRA-RPL: A Novel Lightweight challenge-Response authentication-based technique for securing RPL against dropped DAO attacks,” Comput. Secur., vol. 132, p. 103346, 2023.

[44] M. Zaminkar, F. Sarkohaki, and R. Fotohi, “A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem,” Int. J. Commun. Syst., vol. 34, no. 3, p. e4693, 2021.

[45] V. R. Rajasekar and S. Rajkumar, “DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN,” Cluster Comput., vol. 27, no. 9, pp. 12029–12068, 2024.

[46] H. Kharrufa, H. Al-Kashoash, and A. H. Kemp, “A game theoretic optimization of RPL for mobile Internet of Things applications,” IEEE Sens. J., vol. 18, no. 6, pp. 2520–2530, 2018.

[47] M. Hassan et al., “Gitm: A gini index-based trust mechanism to mitigate and isolate sybil attack in rpl-enabled smart grid advanced metering infrastructures,” IEEE Access, vol. 11, pp. 62697–62720, 2023.

[48] R. Sahay, G. Geethakumari, and K. Modugu, “Attack graph—Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT,” in 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), IEEE, 2018, pp. 308–313.

[49] M. H. Homaei, S. S. Band, A. Pescape, and A. Mosavi, “DDSLA-RPL: dynamic decision system based on learning automata in the RPL protocol for achieving QoS,” IEEE Access, vol. 9, pp. 63131–63148, 2021.

[50] O. A. Abdulkareem, R. K. Kontham, and I. T. Aziz, “Blocollab: A Blockchain-aided Deep Learning Model for Hybrid and Collaborative Routing Attack Detection and Mitigation in RPL.,” Int. J. Intell. Eng. Syst., vol. 17, no. 4, 2024.

[51] E. Aydogan, S. Yilmaz, S. Sen, I. Butun, S. Forsström, and M. Gidlund, “c,” in 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), IEEE, 2019, pp. 1–5.

[52] salah dhifallah, walid; tarhouni, mounira; moulahi, tarek; zidi, “IoT-RPL 2021: Cyber Attack Dataset Based on RPL Routing for IoT.”

[53] A. A. R. A. Omar, B. Soudan, and A. Altaweel, “UOS_IOTSH_2024: A Comprehensive network traffic dataset for sinkhole attacks in diverse RPL IoT networks,” Data Br., vol. 55, p. 110650, 2024.

[54] B. Aydin, H. Aydin, S. G. Örmüş, and E. M. Ollahasanoğlu, “Detection of RPL-based Routing Attacks Using Machine Learning Algorithms,” vol. 4, pp. 783–796, 2024, doi: 10.24012/dumf.1490367.

[55] Z. Z. Motes, “GitHub.” [Online]. Available: https://github.com/contiki-os/contiki/wiki/Zolertia-z1-motes

[56] TETCOS LLP, “NetSim Simulator.” [Online]. Available: https://www.tetcos.com/iot-wsn.html

[57] C. F. Higham and D. J. Higham, “Deep learning: An introduction for applied mathematicians,” Siam Rev., vol. 61, no. 4, pp. 860–891, 2019.

[58] L. Bartolozzi, T. Pecorella, and R. Fantacci, “ns-3 RPL module: IPv6 routing protocol for low power and lossy networks,” in Proceedings of the 5th international ICST conference on simulation tools and techniques, 2012, pp. 359–366.

[59] H. Hosseini, E. Rojas, and D. Carrascal, “Implementation of RPL in omnet++,” arXiv Prepr. arXiv2107.02551, 2021.

[60] J. Ko et al., “Contikirpl and tinyrpl: Happy together,” in Workshop on Extending the Internet to Low Power and Lossy Networks (IP+ SN), 2011.

[61] T. Winter et al., “RPL: IPv6 routing protocol for low-power and lossy networks,” 2012.

[62] Y. Wang, J. Lei, Y. Li, and F. Shang, “GATR: a graph attention deep reinforcement learning approach with variance-sensitive rewards for rpl routing optimization,” J. King Saud Univ. Comput. Inf. Sci., vol. 37, no. 9, pp. 1–18, 2025.

Downloads

Published

16-12-2025

How to Cite

1.
Unnam SR, Shaik K. Fortifying RPL-Based 6LoWPAN in IoT: A Comprehensive Review of Emerging Attack Vectors and Defense Mechanisms using Machine Learning. EAI Endorsed Trans IoT [Internet]. 2025 Dec. 16 [cited 2025 Dec. 17];11. Available from: https://publications.eai.eu/index.php/IoT/article/view/9694

Most read articles by the same author(s)