🤖 AI Summary
To address routing-layer security threats against the RPL protocol in IoT environments, this paper systematically surveys 12 attack categories and 37 defense mechanisms. Methodologically, it employs bibliometric analysis, RPL specification parsing, and cross-layer threat modeling to identify five common vulnerability classes. It further proposes a multi-dimensional evaluation framework for defense techniques—assessing detection accuracy, computational and communication overhead, robustness, and deployability. As key contributions, the work establishes the first holistic analytical framework covering the full attack surface, defense mechanisms, and open research challenges; innovatively identifies lightweight trusted execution environments (TEEs) and AI-driven anomaly detection as critical evolutionary directions; and provides both theoretical foundations and practical guidance for RPL security standardization and next-generation protection mechanism design. (149 words)