RPL Authenticated Mode Evaluation: Authenticated Key Exchange and Network Behavioral

Ordu A. B., Bayar M., Örs Yalçın S. B.

13th International Conference on Ubiquitous and Future Networks (ICUFN), ELECTR NETWORK, 5 - 08 July 2022, pp.167-173 identifier identifier

  • Publication Type: Conference Paper / Full Text
  • Doi Number: 10.1109/icufn55119.2022.9829601
  • Page Numbers: pp.167-173
  • Keywords: IoT, security, standard, authentication, 6LoWPAN, RPL, SECURITY, INTERNET
  • Istanbul Technical University Affiliated: Yes


RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) is a standardized routing protocol that can organize thousands of resource constraint routers. Although it is an indispensable protocol with its energy-efficient, scalable, and autonomous structure, it is vulnerable to numerous attacks with its sensitive data and mechanisms. In this paper, we intensely analyzed the standard statements of the authenticated security mode of RPL and designed a comprehensive authenticated key establishment scheme extending the BKE (Bilateral Key Exchange). We formally verified our scheme using the Scyther tool. This study will help researchers contribute more to the authenticated security mode of RPL.