A comprehensive survey on RPL routing-based attacks, defences and future directions in Internet of Things

被引:0
作者
Prajapati, Anil Kumar [1 ,2 ]
Pilli, Emmanuel S. [1 ]
Battula, Ramesh Babu [1 ]
Varadharajan, Vijay [3 ]
Verma, Abhishek [4 ]
Joshi, R. C. [5 ]
机构
[1] Malaviya Natl Inst Technol, Dept Comp Sci & Engn, Jaipur, India
[2] Manipal Univ Jaipur, Dept Data Sci & Engn, Jaipur, India
[3] Univ Newcastle, Sch Informat & Phys Sci, Callaghan, Australia
[4] Babasaheb Bhimrao Ambedkar Univ, Dept Informat Technol, Lucknow, India
[5] Indian Inst Technol, Dept Elect & Comp Engn, Roorkee, India
关键词
Internet of things (ioT); Routing protocol for LLNs (RPL); 6LoWPAN; Routing attacks; Defense mechanisms; IoT security; INTRUSION DETECTION SYSTEM; VERSION NUMBER ATTACKS; LOW-POWER; SYBIL ATTACKS; MITIGATION; NETWORKS; SECURITY; PROTOCOL; HYBRID; MACHINE;
D O I
10.1016/j.compeleceng.2025.110071
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a network of digital devices like sensors, processors, embedded and communication devices that can connect to and exchange data with other devices and systems over the internet. IoT devices have limitations on power, memory, and computational resources. Researchers have developed the IPv6 Over Low-power Wireless Personal Area Network (6LoWPAN) protocols to provide wireless connectivity among these devices while overcoming the constraints on resources. 6LoWPAN has been approved subsequently by the Internet Engineering Task Force (IETF). The IETF Routing Over Low-power and Lossy Networks (ROLL) standardized the Routing Protocol for LLNs known as RPL (IETF RFC 6550), which is part of the 6LoWPAN stack. However, IoT devices are vulnerable to various attacks on RPL-based routing. This survey provides an in depth study of existing RPL-based attacks and defense published from year 2011 to 2024 from highly reputed journals and conferences. By thematic analysis of existing routing attacks on RPL, we developed a novel attack taxonomy which focuses on the nature of routing attacks and classifies them into 12 major categories. Subsequently, the impact of each attack on the network is analyzed and discussed real life scenarios of these attacks. Another contribution of this survey proposed a novel taxonomy for classification of defense mechanisms into 8 major categories against routing attacks based on type of defense strategy. The detailed analysis of each defense mechanism with real life applicability is explained. Furthermore, evaluation tools such as testbeds and simulators for RPL-based attack and defense are discussed and critically analyzed in terms of real world applicability. Finally, open research challenges are presented on the basis of research gaps of existing literature along with research directions for practitioners and researchers. We believe our study will give actionable insights and solid foundation for researchers to expand effective defense solutions against emerging RPL routing attacks in IoT networks.
引用
收藏
页数:44
相关论文
共 186 条
[1]   A secure routing protocol for low power and lossy networks based 6LoWPAN networks to mitigate DIS flooding attacks [J].
Abhinaya, E. V. ;
Sudhakar, B. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
[2]  
Adjih C, 2015, 2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P459, DOI 10.1109/WF-IoT.2015.7389098
[3]   DETONAR: Detection of Routing Attacks in RPL-Based IoT [J].
Agiollo, Andrea ;
Conti, Mauro ;
Kaliyar, Pallavi ;
Lin, Tsung-Nan ;
Pajola, Luca .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02) :1178-1190
[4]  
Agustin JPC, 2017, TENCON IEEE REGION, P3129, DOI 10.1109/TENCON.2017.8228399
[5]   State-of-the-art survey of artificial intelligent techniques for IoT security [J].
Ahanger, Tariq Ahamed ;
Aljumah, Abdullah ;
Atiquzzaman, Mohammed .
COMPUTER NETWORKS, 2022, 206
[6]   Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks [J].
Ahmed, Firoz ;
Ko, Young-Bae .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) :5143-5154
[7]   SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things [J].
Airehrour, David ;
Gutierrez, Jairo A. ;
Ray, Sayan Kumar .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 :860-876
[8]  
Airehrour D, 2016, 2016 26TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P115, DOI 10.1109/ATNAC.2016.7878793
[9]   Secure routing for internet of things: A survey [J].
Airehrour, David ;
Gutierrez, Jairo ;
Ray, Sayan Kumar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :198-213
[10]   Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks [J].
Al Sawafi, Yahya ;
Touzene, Abderezak ;
Hedjam, Rachid .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2023, 12 (02)