A comprehensive survey on detection of sinkhole attack in routing over low power and Lossy network for internet of things

被引:6
作者
Omar, Aya Abdul Rahman Al-chikh [1 ]
Soudan, Bassel [1 ]
Altaweel, Ala [1 ]
机构
[1] Univ Sharjah, Coll Comp & Informat, Dept Comp Engn, Sharjah, U Arab Emirates
关键词
Sinkhole attack; RPL; Security; Attack detection; LLNs; IoT; INTRUSION DETECTION; HYBRID;
D O I
10.1016/j.iot.2023.100750
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of things (IoT) is a developing technology that has produced remarkable advancements and contributions in numerous applications. IoT refers to a system of wirelessly interconnected heterogeneous nodes or sensors over Low-power and Lossy Networks (LLNs). The main routing protocol of the LLNs is the Routing Protocol over Low power and Lossy network (RPL). RPL is a lightweight routing protocol designed to meet the memory, energy, and bandwidth constraints of LLNs and IoT devices. Because of their constraints, IoT systems are subject to challenges such as reliable data transmission, and network security. This work will review several security mechanisms that have been proposed in the literature to secure RPL-based IoT systems against sinkhole attack. The proposed mechanisms will be discussed, classified, and analyzed in terms of their performance, datasets, implementation details, and limitations. This work will also present some research gap analysis and suggestions for future research topics in this general area.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Alzubaidi Mahmood, 2017, 2017 8th International Conference on Information Technology (ICIT). Proceedings, P369, DOI 10.1109/ICITECH.2017.8080028
  • [2] Alzubaidi M., 2018, J. Commun., V13, P198, DOI [10.12720/jcm.13.5.198-208, DOI 10.12720/JCM.13.5.198-208]
  • [3] An Ga Hyeon, 2022, International Journal of Computer Networks and Applications, P169, DOI 10.22247/ijcna/2022/212333
  • [4] ANRG, 2016, COOJ SIM
  • [5] Evaluating and improving the scalability of RPL security in the Internet of Things
    Arena, Antonio
    Perazzo, Pericle
    Vallati, Carlo
    Dini, Gianluca
    Anastasi, Giuseppe
    [J]. COMPUTER COMMUNICATIONS, 2020, 151 : 119 - 132
  • [6] Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT
    Avila, Karen
    Jabba, Daladier
    Gomez, Javier
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (18):
  • [7] Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach
    Bostani, Hamid
    Sheikhan, Mansour
    [J]. COMPUTER COMMUNICATIONS, 2017, 98 : 52 - 71
  • [8] Browning Jim, 2016, 2016 IEEE International Conference on Plasma Science (ICOPS), DOI 10.1109/PLASMA.2016.7533988
  • [9] Cervantes C, 2015, PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), P606, DOI 10.1109/INM.2015.7140344
  • [10] Choudhary S, 2019, I C COMP SYST APPLIC, DOI 10.1109/aiccsa47632.2019.9035319