{"id":768,"date":"2024-12-11T23:18:15","date_gmt":"2024-12-12T04:18:15","guid":{"rendered":"https:\/\/carleton.ca\/ngn\/?p=768"},"modified":"2024-12-11T23:38:59","modified_gmt":"2024-12-12T04:38:59","slug":"routing-protocol-for-low-power-and-lossy-networks-rpl-_-projects","status":"publish","type":"post","link":"https:\/\/carleton.ca\/ngn\/2024\/routing-protocol-for-low-power-and-lossy-networks-rpl-_-projects\/","title":{"rendered":"Routing Protocol for Low Power and Lossy Networks (RPL) &#8211; Projects"},"content":{"rendered":"<p><strong>Securing RPL Using Network Coding: The Chained Secure Mode (CSM)<\/strong><\/p>\n<p>Considered the preferred routing protocol for many Internet of Things (IoT) networks, the routing protocol for low power and lossy networks (RPL) incorporates three security modes to protect the integrity and confidentiality of the routing process: 1) the unsecured mode (UM); 2) preinstalled secure mode (PSM); and 3) the authenticated secure mode (ASM). Both PSM and ASM were originally designed to protect against external routing attacks, in addition to some replay attacks (through an optional replay protection mechanism). However, recent research showed that RPL, even when it operates in PSM, is still vulnerable to many routing attacks, both internal and external. In this article, a novel secure mode for RPL, the chained secure mode (CSM), is proposed using the concept of intraflow network coding (NC). The CSM is designed to enhance RPL\u2019s resiliency and mitigation capability against replay attacks. In addition, CSM allows the integration with external security measures such as intrusion detection systems (IDSs). An evaluation of the proposed CSM, from a security and performance point of view, was conducted and compared against RPL in UM and PSM (with and without the optional replay protection) under several routing attacks: the neighbor attack (NA), wormhole (WH), and CloneID attack (CA), using average packet delivery rate (PDR), end-to-end (E2E) latency, and power consumption as metrics. It showed that CSM has better performance and more enhanced security than both the UMandPSMwiththereplay protection while mitigating both the NA and WH attacks and significantly reducing the effect of the CA in the investigated scenarios.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-769 size-full\" src=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/CSM.png\" alt=\"\" width=\"351\" height=\"375\" srcset=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/CSM.png 351w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/CSM-240x256.png 240w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/CSM-160x171.png 160w\" sizes=\"(max-width: 351px) 100vw, 351px\" \/><\/p>\n<p><\/p>\n<p>Raoof, C. -H. Lung and A. Matrawy, \u201cSecuring RPL Using Network Coding: The Chained Secure Mode (CSM),\u201d in IEEE Internet of Things Journal, vol. 9, no. 7, pp. 4888-4898, 1 April 1, 2022, doi: 10.1109\/JIOT.2021.3109109.1<\/p>\n<p><\/p>\n<p><strong>Enhancing Routing Security in IoT: Performance Evaluation of RPL Secure Mode under Attacks<\/strong><\/p>\n<p>As the routing protocol for low power and lossy networks (RPL)s became the standard for routing in the Internet of Things (IoT) networks, many researchers had investigated the security aspects of this protocol. However, no work (to the best of our knowledge) has investigated the use of the security mechanisms included in RPL\u2019s standard, mainly because there was no implementation for these features in any Internet of Things (IoT) operating systems yet. A partial implementation of RPL\u2019s security mechanisms was presented recently for the Contiki operating system (by Perazzo et al.), which provided us with an opportunity to examine RPL\u2019s security mechanisms. In this article, we investigate the effects and challenges of using RPL\u2019s security mechanisms under common routing attacks. First, a comparison of RPL\u2019s performance, with and without its security mechanisms, under four routing attacks [Blackhole, Selective-Forward (SF), Neighbor, and Wormhole (WH) attacks] is conducted using several metrics (e.g., average data packet delivery rate, average data packet latency, average power consumption, etc.). This comparison is performed using two commonly used radio duty cycle protocols. Second, and based on the observations from this comparison, we propose two techniques that could reduce the effects of such attacks without having added security mechanisms for RPL. An evaluation of these techniques shows improved performance of RPL under the investigated attacks, except for the WH.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-772 size-full aligncenter\" src=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/RPL-IoT.png\" alt=\"\" width=\"624\" height=\"443\" srcset=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/RPL-IoT.png 624w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/RPL-IoT-240x170.png 240w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/RPL-IoT-400x284.png 400w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/RPL-IoT-160x114.png 160w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/RPL-IoT-360x256.png 360w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/p>\n<p>Ahmed Raoof, Ashraf Matrawy, and Chung-Horng Lung, \u201cEnhancing Routing Security in IoT: Performance Evaluation of RPL Secure Mode under Attacks,\u201d IEEE Internet of Things Journal (Early Access), September 2020.<\/p>\n<p><\/p>\n<p><strong>Routing Attacks and Mitigation Methods for RPL-Based Internet of Things<\/strong><\/p>\n<p>The recent bloom of the Internet of Things (IoT) and its prevalence in many security-sensitive environments made the security of these networks a crucial requirement. Routing in many of IoT networks has been performed using the routing protocol for low power and lossy networks (RPL), due to its energy-efficient mechanisms, secure modes availability, and its adaptivity to work in various environments; hence, RPL security has been the focus of many researchers. This paper presents a comprehensive study of RPL, its known attacks, and the mitigation methods proposed to counter these attacks. We conducted a detailed review of the RPL standard, including a recently proposed modification. Also, we investigated all recently published attacks on RPL and their mitigation methods through the literature. Based on this investigation, and to the best of our knowledge, we introduced a first-of-its-kind classification scheme for the mitigation methods that is based on the techniques used for the mitigation. Furthermore, we thoroughly discussed RPL-based intrusion detection systems (IDSs) and their classifications, highlighting the most recently proposed IDSs.<\/p>\n<p><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-775 size-full\" src=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/RPL_based1.png\" alt=\"\" width=\"624\" height=\"162\" srcset=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/RPL_based1.png 624w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/RPL_based1-240x62.png 240w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/RPL_based1-400x104.png 400w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/RPL_based1-160x42.png 160w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/RPL_based1-360x93.png 360w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/> <img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-776 size-full\" src=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/RPL-Based2.png\" alt=\"\" width=\"360\" height=\"268\" srcset=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/RPL-Based2.png 360w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/RPL-Based2-240x179.png 240w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/RPL-Based2-160x119.png 160w\" sizes=\"(max-width: 360px) 100vw, 360px\" \/><\/p>\n<p>Ahmed Raoof, Ashraf Matrawy, and Chung-Horng Lung, \u201cRouting Attacks and Mitigation Methods for RPL-Based Internet of Things,\u201d IEEE Communications Surveys and Tutorials, (Early Access), December 2019.<\/p>\n<p><\/p>\n<p><strong>On the Impact of the RPL Decreased Rank Attack on 6TiSCH Networks. <\/strong><\/p>\n<p>The 6TiSCH protocol stack was designed to provide a reliable and time-bound multi-hop routing solution for the Industrial Internet of Things (IIoT), integrating the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) and Time Slotted Channel Hopping (TSCH) protocols seamlessly. However, deviations from standard procedures by malicious nodes can severely affect network formation and operations, resulting in degraded performance. This study investigates the impact of the decreased rank attack (DRA) on RPL within the 6TiSCH network, examining its effects on network operations and performance. Experimental evaluation reveals that DRA can lead to an average delay of 21.4% in network formation and run time disruptions, thereby affecting the 6TiSCH synchronization process. Consequently, node departures from the network and subsequent rejoining to maintain the topology increase by an average of 60.71%. To deal with this disruption, the nodes need to send more keep-alive and RPL messages, resulting in an average increase of 69.70% and 20.08%, respectively, leading to a 49. 9% increase in energy depletion. Furthermore, the DRA reduces the packet delivery ratio and increases the average end-to-end packet delay by averages of 5.13% and 20%, respectively. However, it is important to note that the impact of the attack can vary significantly depending on the specific configurations and setups used, such as network topology, network size, attacker position, neighboring density, and RPL\/TSCH parameter settings.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-779 size-full\" src=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6TiSCH1.png\" alt=\"\" width=\"302\" height=\"194\" srcset=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6TiSCH1.png 302w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6TiSCH1-240x154.png 240w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6TiSCH1-160x103.png 160w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6TiSCH1-300x194.png 300w\" sizes=\"(max-width: 302px) 100vw, 302px\" \/> <img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-780 size-full\" src=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6TiSCH2.png\" alt=\"\" width=\"331\" height=\"261\" srcset=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6TiSCH2.png 331w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6TiSCH2-240x189.png 240w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6TiSCH2-160x126.png 160w\" sizes=\"(max-width: 331px) 100vw, 331px\" \/><\/p>\n<p>Mohammed Mahyoub, Sazzad Hossain, and Ashraf Matrawy (2024). On the Impact of the RPL Decreased Rank Attack on 6TiSCH Networks. Accepted at (2024 20th International Conference on the Design of Reliable Communication Networks (<a href=\"https:\/\/drcn2024.encs.concordia.ca\/\">DRCN))<\/a><\/p>\n<p><\/p>\n<p><strong>Integrating 6LoWPAN Security with RPL Using the Chained Secure Mode Framework\u201d,\u00a0The 14th\u00a0IEEE International Conference on Internet of Things, 2021.<\/strong><\/p>\n<p>The IPv6 over Low-powered Wireless Personal Area Network (6LoWPAN) protocol was introduced to allow the transmission of Internet Protocol version 6 (IPv6) packets using the smaller-size frames of the IEEE 802.15.4 standard, which is used in many Internet of Things (IoT) networks. The primary duty of the 6LoWPAN protocol is packet fragmentation and reassembly. However, the protocol\u2019s standard currently does not include any security measures, not even authenticating the fragments\u2019 immediate sender. This lack of immediate-sender authentication opens the door for adversaries to launch several attacks on the fragmentation process, such as the buffer-reservation attacks that lead to a Denial of Service (DoS) attack and resource exhaustion of the victim nodes. This paper proposes a security integration between 6LoWPAN and the Routing Protocol for Low Power and Lossy Networks (RPL) through the Chained Secure Mode (CSM) framework as a possible solution. Since the CSM framework provides a mean of immediate-sender trust, through the use of Network Coding (NC), and an integration interface for the other protocols (or mechanisms) to use this trust to build security decisions, 6LoWPAN can use this integration to build a chain of-trust along the fragments routing path. A proof-of-concept implementation was done in Contiki Operating System (OS), and its security and performance were evaluated against an external adversary launching a buffer-reservation attack. The results from the evaluation showed significant mitigation of the attack with almost no increase in power consumption, which presents the great potential for such integration to secure the forwarding process at 6LoWPAN Adaptation Layer.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-782 size-full\" src=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6LoWaPAN.png\" alt=\"\" width=\"354\" height=\"286\" srcset=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6LoWaPAN.png 354w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6LoWaPAN-240x194.png 240w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6LoWaPAN-160x129.png 160w\" sizes=\"(max-width: 354px) 100vw, 354px\" \/><\/p>\n<p><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-783 size-full\" src=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6LoWaPAN1.png\" alt=\"\" width=\"559\" height=\"467\" srcset=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6LoWaPAN1.png 559w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6LoWaPAN1-240x201.png 240w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6LoWaPAN1-400x334.png 400w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6LoWaPAN1-160x134.png 160w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/6LoWaPAN1-360x301.png 360w\" sizes=\"(max-width: 559px) 100vw, 559px\" \/><\/p>\n<p><\/p>\n<p>A Raoof, CH Lung, A Matrawy, \u201cIntegrating 6LoWPAN Security with RPL Using the Chained Secure Mode Framework\u201d,\u00a0The 14th\u00a0IEEE International Conference on Internet of Things, 2021.<\/p>\n<p><\/p>\n<p><strong>Introducing Network Coding to RPL: The Chained Secure Mode (CSM)<\/strong><\/p>\n<p>The current standard of Routing Protocol for Low Power and Lossy Networks (RPL) incorporates three modes of security: the Unsecured Mode (UM), Preinstalled Secure Mode (PSM), and the Authenticated Secure Mode (ASM). While the PSM and ASM are intended to protect against external routing attacks through an optional replay protection mechanism, recent research showed that RPL in PSM is still vulnerable to many routing attacks, both internal and external. In this paper, we propose a novel secure mode for RPL, the Chained Secure Mode (CSM), based on the concept of intra-flow Network Coding. The main goal of CSM is to enhance RPL&#8217;s resilience against replay attacks, with the ability to mitigate some of them. The security and performance of a proof-of-concept prototype of CSM were evaluated and compared against RPL in UM and PSM (with and without the optional replay protection) in the presence of Neighbor attack as an example. It showed that CSM has better performance and more robustness and efficiency compared to both the UM and PSM with the replay protection. On the other hand, it showed a need for a proper recovery mechanism for the case of losing a control message.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-784 size-full\" src=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Integating-6LoWPAN.png\" alt=\"\" width=\"624\" height=\"206\" srcset=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Integating-6LoWPAN.png 624w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Integating-6LoWPAN-240x79.png 240w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Integating-6LoWPAN-400x132.png 400w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Integating-6LoWPAN-160x53.png 160w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Integating-6LoWPAN-360x119.png 360w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/p>\n<p><\/p>\n<p>Raoof, C. -H. Lung and A. Matrawy, \u201cIntroducing Network Coding to RPL: The Chained Secure Mode (CSM),\u201d\u00a02020 IEEE 19th International Symposium on Network Computing and Applications (NCA), 2020, pp. 1-4, doi: 10.1109\/NCA51143.2020.9306744. January 2021<\/p>\n<p><\/p>\n<p><strong>Secure Routing in IoT: Evaluation of RPL\u2019s Secure Mode under Attacks<\/strong><\/p>\n<p>As the Routing Protocol for Low Power and Lossy Networks (RPL) became the standard for routing in the Internet of Things (IoT) networks, many researchers had investigated the security aspects of this protocol. However, no work (to the best of our knowledge) has investigated the use of the security mechanisms included in the protocol\u2019s standard, due to the fact that there was no implementation for these features in any IoT operating system yet. A partial implementation of RPL\u2019s security mechanisms was presented recently for Contiki operating system (by Perazzo et al.), which provided us with the opportunity to examine RPL\u2019s security mechanisms. In this paper, we investigate the effects and challenges of using RPL\u2019s security mechanisms under common routing attacks. First, a comparison of RPL\u2019s performance, with and without its security mechanisms, under three routing attacks (Blackhole, Selective-Forward, and Neighbor attacks) is conducted using several metrics (e.g., average data packet delivery rate, average data packet delay, average power consumption&#8230; etc.) Based on the observations from this comparison, we come up with few suggestions that could reduce the effects of such attacks, without having added security mechanisms for RPL.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-786 size-full\" src=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Secure-Routing1.png\" alt=\"\" width=\"624\" height=\"231\" srcset=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Secure-Routing1.png 624w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Secure-Routing1-240x89.png 240w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Secure-Routing1-400x148.png 400w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Secure-Routing1-160x59.png 160w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Secure-Routing1-360x133.png 360w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/> <img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-787 size-full\" src=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Secure-Routing2.png\" alt=\"\" width=\"624\" height=\"492\" srcset=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Secure-Routing2.png 624w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Secure-Routing2-240x189.png 240w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Secure-Routing2-400x315.png 400w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Secure-Routing2-160x126.png 160w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Secure-Routing2-360x284.png 360w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/p>\n<p><\/p>\n<p>Ahmed Raoof, Ashraf Matrawy and Chung-Horng Lung, \u201cSecure Routing in IoT: Evaluation of RPL\u2019s Secure Mode under Attacks\u201d, in Proc. of the IEEE Global Communications Conference (GLOBECOM 2019), Waikoloa, HI, USA, 9 \u2013 13 December 2019.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Securing RPL Using Network Coding: The Chained Secure Mode (CSM) Considered the preferred routing protocol for many Internet of Things (IoT) networks, the routing protocol for low power and lossy networks (RPL) incorporates three security modes to protect the integrity and confidentiality of the routing process: 1) the unsecured mode (UM); 2) preinstalled secure mode [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[23],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Routing Protocol for Low Power and Lossy Networks (RPL) - Projects - Next Generation Networks Lab<\/title>\n<meta name=\"description\" content=\"Securing RPL Using Network Coding: The Chained Secure Mode (CSM) Considered the preferred routing protocol for many Internet of Things (IoT) networks, the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/ngn\/2024\/routing-protocol-for-low-power-and-lossy-networks-rpl-_-projects\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EMMANUELALALADE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/ngn\/2024\/routing-protocol-for-low-power-and-lossy-networks-rpl-_-projects\/\",\"url\":\"https:\/\/carleton.ca\/ngn\/2024\/routing-protocol-for-low-power-and-lossy-networks-rpl-_-projects\/\",\"name\":\"Routing Protocol for Low Power and Lossy Networks (RPL) - Projects - Next Generation Networks Lab\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/ngn\/#website\"},\"datePublished\":\"2024-12-12T04:18:15+00:00\",\"dateModified\":\"2024-12-12T04:38:59+00:00\",\"author\":{\"@id\":\"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/e9f1cb85a289e5c4a84d31fd7eaa19ba\"},\"description\":\"Securing RPL Using Network Coding: The Chained Secure Mode (CSM) Considered the preferred routing protocol for many Internet of Things (IoT) networks, the\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/ngn\/2024\/routing-protocol-for-low-power-and-lossy-networks-rpl-_-projects\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/ngn\/2024\/routing-protocol-for-low-power-and-lossy-networks-rpl-_-projects\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/ngn\/2024\/routing-protocol-for-low-power-and-lossy-networks-rpl-_-projects\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/ngn\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Projects\",\"item\":\"https:\/\/carleton.ca\/ngn\/category\/projects\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Routing Protocol for Low Power and Lossy Networks (RPL) &#8211; Projects\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/ngn\/#website\",\"url\":\"https:\/\/carleton.ca\/ngn\/\",\"name\":\"Next Generation Networks Lab\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/ngn\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/e9f1cb85a289e5c4a84d31fd7eaa19ba\",\"name\":\"EMMANUELALALADE\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/135680cf7581dbe522d4016ee5d6cf16?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/135680cf7581dbe522d4016ee5d6cf16?s=96&d=mm&r=g\",\"caption\":\"EMMANUELALALADE\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Routing Protocol for Low Power and Lossy Networks (RPL) - Projects - Next Generation Networks Lab","description":"Securing RPL Using Network Coding: The Chained Secure Mode (CSM) Considered the preferred routing protocol for many Internet of Things (IoT) networks, the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/ngn\/2024\/routing-protocol-for-low-power-and-lossy-networks-rpl-_-projects\/","twitter_misc":{"Written by":"EMMANUELALALADE","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/ngn\/2024\/routing-protocol-for-low-power-and-lossy-networks-rpl-_-projects\/","url":"https:\/\/carleton.ca\/ngn\/2024\/routing-protocol-for-low-power-and-lossy-networks-rpl-_-projects\/","name":"Routing Protocol for Low Power and Lossy Networks (RPL) - Projects - Next Generation Networks Lab","isPartOf":{"@id":"https:\/\/carleton.ca\/ngn\/#website"},"datePublished":"2024-12-12T04:18:15+00:00","dateModified":"2024-12-12T04:38:59+00:00","author":{"@id":"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/e9f1cb85a289e5c4a84d31fd7eaa19ba"},"description":"Securing RPL Using Network Coding: The Chained Secure Mode (CSM) Considered the preferred routing protocol for many Internet of Things (IoT) networks, the","breadcrumb":{"@id":"https:\/\/carleton.ca\/ngn\/2024\/routing-protocol-for-low-power-and-lossy-networks-rpl-_-projects\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/ngn\/2024\/routing-protocol-for-low-power-and-lossy-networks-rpl-_-projects\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/ngn\/2024\/routing-protocol-for-low-power-and-lossy-networks-rpl-_-projects\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/ngn\/"},{"@type":"ListItem","position":2,"name":"Projects","item":"https:\/\/carleton.ca\/ngn\/category\/projects\/"},{"@type":"ListItem","position":3,"name":"Routing Protocol for Low Power and Lossy Networks (RPL) &#8211; Projects"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/ngn\/#website","url":"https:\/\/carleton.ca\/ngn\/","name":"Next Generation Networks Lab","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/ngn\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/e9f1cb85a289e5c4a84d31fd7eaa19ba","name":"EMMANUELALALADE","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/135680cf7581dbe522d4016ee5d6cf16?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/135680cf7581dbe522d4016ee5d6cf16?s=96&d=mm&r=g","caption":"EMMANUELALALADE"}}]}},"acf":{"Post Thumbnail Icon":"","Post Thumbnail":false},"_links":{"self":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/posts\/768"}],"collection":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/comments?post=768"}],"version-history":[{"count":4,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/posts\/768\/revisions"}],"predecessor-version":[{"id":790,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/posts\/768\/revisions\/790"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/media?parent=768"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/categories?post=768"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/tags?post=768"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}