An Overview of RPL Networks from the Viewpoint of Cybersecurity

RPL, Contiki, COOJA, Security challenges, IoT


  • Cosmina STALIDI (Primary Contact)
    Beia Consult International & Faculty of Electronics, Telecommunications and Information Technology, UPB
  • Eduard-Cristian POPOVICI Telecommunications Department, Faculty of Electronics, Telecommunications and Information Technology & Beia Consult International
  • George SUCIU Beia Consult International


In the past decade, the Internet of Things (IoT) has had a significant impact on a global scale. The Internet of Things (IoT) has facilitated the interconnection of a vast number of devices in contemporary times. The proliferation of Internet of Things (IoT) devices underscores the importance of ensuring robust security measures to safeguard against potential threats. The RPL protocol has been specifically designed for routing purposes within the context of IoT devices, operating at the network layer. The exploitation of the RPL protocol poses a threat to IoT networks and has the potential to substantially affect network performance. This article introduces the STACK project, which aims to improve IoT transmission capabilities, identify and mitigate attacks using performance and interference monitoring, and use methods tightly integrated with an intelligent edge.