Addressing the DAO Insider Attack in RPL’s Internet of Things Networks

Baraq Ghaleb, Ahmed Al-Dubai, Elias Ekonomou, Mamoun Qasem, Imed Romdhani, Lewis Mackenzie

Research output: Contribution to journalArticlepeer-review

50 Downloads (Pure)


In RPL routing protocol, the destination advertisement object (DAO) control messages are announced by the child nodes to their parents to build downward routes. A malicious insider node can exploit this feature to send fake DAOs to its parents periodically, triggering those parents, in turn, to forward the fake messages upward to the root node. In this letter, we show how this behavior can have a detrimental side effect on the performance of the network, increasing power consumption, latency, and reducing reliability. To address this problem, a new scheme is introduced to mitigate significantly the effect of the DAO attack on network performance.
Original languageEnglish
Pages (from-to)68-71
JournalIEEE Communications Letters
Issue number1
Publication statusPublished - 1 Jan 2019


  • Internet of Things
  • low-power and lossy networks
  • RPL security
  • DAO attack


Dive into the research topics of 'Addressing the DAO Insider Attack in RPL’s Internet of Things Networks'. Together they form a unique fingerprint.

Cite this