Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy

被引:7
作者
Alfriehat, Nadia A. [1 ]
Anbar, Mohammed [1 ]
Karuppayah, Shankar [1 ]
Rihan, Shaza Dawood Ahmed [2 ]
Alabsi, Basim Ahmad [2 ]
Momani, Alaa M. [3 ]
机构
[1] Univ Sains Malaysia USM, Natl Adv IPv6 Ctr NAv6, George Town 11800, Penang, Malaysia
[2] Najran Univ, Appl Coll, Najran 61441, Saudi Arabia
[3] Univ City Sharjah, Skyline Univ Coll, Sch Comp, Sharjah, U Arab Emirates
关键词
Security; Protocols; Wireless sensor networks; Internet of Things; Reviews; Routing; Throughput; Intrusion detection; Low-power electronics; Research and development; IoT; RPL protocol; VNA; intrusion detection system; security; LLN; WIRELESS SENSOR NETWORKS; INTRUSION DETECTION SYSTEMS; 6LOWPAN NETWORKS; RPL; PROTOCOLS;
D O I
10.1109/ACCESS.2024.3368633
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The internet of things (IoT) is an emerging technological advancement with significant implications. It connects a wireless sensor or node network via low-power and lossy networks (LLN). The routing protocol over a low-power and lossy network (RPL) is the fundamental component of LLN. Its lightweight design effectively addresses the limitations imposed by bandwidth, energy, and memory on both LLNs and IoT devices. Notwithstanding its efficacy, RPL introduces susceptibilities, including the version number attack (VNA), which underscores the need for IoT systems to implement effective security protocols. This work reviews and categorizes the security mechanisms proposed in the literature to detect VNA against RPL-based IoT networks. The existing mechanisms are thoroughly discussed and analyzed regarding their performance, datasets, implementation details, and limitations. Furthermore, a qualitative comparison is presented to benchmark this work against existing studies, showcasing its uniqueness. Finally, this work analyzes research gaps and proposes future research avenues.
引用
收藏
页码:31136 / 31158
页数:23
相关论文
共 50 条
  • [1] Security explorations for routing attacks in low power networks on internet of things
    Sharma, Saurabh
    Verma, Vinod Kumar
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (05) : 4778 - 4812
  • [2] Routing Protocols for Low Power and Lossy Networks in Internet of Things Applications
    Sobral, Jose V. V.
    Rodrigues, Joel J. P. C.
    Rabelo, Ricardo A. L.
    Al-Muhtadi, Jalal
    Korotaev, Valery
    SENSORS, 2019, 19 (09)
  • [3] Security explorations for routing attacks in low power networks on internet of things
    Saurabh Sharma
    Vinod Kumar Verma
    The Journal of Supercomputing, 2021, 77 : 4778 - 4812
  • [4] Investigations on Information Solicitation and Version Number Attacks in Internet of Things
    Verma, Vinod Kumar
    Sharma, Saurabh
    IEEE SENSORS JOURNAL, 2023, 23 (03) : 3204 - 3211
  • [5] Ensuring Seamless Connectivity in Internet of Things: The Role of Low Power Lossy Networks
    Jaisooraj, J.
    Kumar, S. D. Madhu
    2018 IEEE REGION 10 HUMANITARIAN TECHNOLOGY CONFERENCE (R10-HTC), 2018,
  • [6] A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy Networks
    Nikravan, Mohammad
    Movaghar, Ali
    Hosseinzadeh, Mehdi
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (02) : 1035 - 1059
  • [7] A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy Networks
    Mohammad Nikravan
    Ali Movaghar
    Mehdi Hosseinzadeh
    Wireless Personal Communications, 2018, 99 : 1035 - 1059
  • [8] A comprehensive survey on detection of sinkhole attack in routing over low power and Lossy network for internet of things
    Omar, Aya Abdul Rahman Al-chikh
    Soudan, Bassel
    Altaweel, Ala
    INTERNET OF THINGS, 2023, 22
  • [9] The applications of the routing protocol for low-power and lossy networks (RPL) on the internet of mobile things
    Ghanbari, Zahra
    Navimipour, Nima Jafari
    Hosseinzadeh, Mehdi
    Shakeri, Hassan
    Darwesh, Aso
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (14)
  • [10] Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review
    Abdullahi, Mujaheed
    Baashar, Yahia
    Alhussian, Hitham
    Alwadain, Ayed
    Aziz, Norshakirah
    Capretz, Luiz Fernando
    Abdulkadir, Said Jadid
    ELECTRONICS, 2022, 11 (02)