Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy

被引:8
作者
Alfriehat, Nadia A. [1 ]
Anbar, Mohammed [1 ]
Karuppayah, Shankar [1 ]
Rihan, Shaza Dawood Ahmed [2 ]
Alabsi, Basim Ahmad [2 ]
Momani, Alaa M. [3 ]
机构
[1] Univ Sains Malaysia USM, Natl Adv IPv6 Ctr NAv6, George Town 11800, Penang, Malaysia
[2] Najran Univ, Appl Coll, Najran 61441, Saudi Arabia
[3] Univ City Sharjah, Skyline Univ Coll, Sch Comp, Sharjah, U Arab Emirates
关键词
Security; Protocols; Wireless sensor networks; Internet of Things; Reviews; Routing; Throughput; Intrusion detection; Low-power electronics; Research and development; IoT; RPL protocol; VNA; intrusion detection system; security; LLN; WIRELESS SENSOR NETWORKS; INTRUSION DETECTION SYSTEMS; 6LOWPAN NETWORKS; RPL; PROTOCOLS;
D O I
10.1109/ACCESS.2024.3368633
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The internet of things (IoT) is an emerging technological advancement with significant implications. It connects a wireless sensor or node network via low-power and lossy networks (LLN). The routing protocol over a low-power and lossy network (RPL) is the fundamental component of LLN. Its lightweight design effectively addresses the limitations imposed by bandwidth, energy, and memory on both LLNs and IoT devices. Notwithstanding its efficacy, RPL introduces susceptibilities, including the version number attack (VNA), which underscores the need for IoT systems to implement effective security protocols. This work reviews and categorizes the security mechanisms proposed in the literature to detect VNA against RPL-based IoT networks. The existing mechanisms are thoroughly discussed and analyzed regarding their performance, datasets, implementation details, and limitations. Furthermore, a qualitative comparison is presented to benchmark this work against existing studies, showcasing its uniqueness. Finally, this work analyzes research gaps and proposes future research avenues.
引用
收藏
页码:31136 / 31158
页数:23
相关论文
共 91 条
[1]   DETONAR: Detection of Routing Attacks in RPL-Based IoT [J].
Agiollo, Andrea ;
Conti, Mauro ;
Kaliyar, Pallavi ;
Lin, Tsung-Nan ;
Pajola, Luca .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02) :1178-1190
[2]   A Distributed and Cooperative Verification Mechanism to Defend against DODAG Version Number Attack in RPL [J].
Ahmed, Firoz ;
Ko, Young-Bae .
PECCS: PROCEEDINGS OF THE 6TH INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND EMBEDDED COMPUTING AND COMMUNICATION SYSTEMS, 2016, :55-62
[3]   A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things [J].
Al-Amiedy, Taief Alaa ;
Anbar, Mohammed ;
Belaton, Bahari ;
Kabla, Arkan Hammoodi Hasan ;
Hasbullah, Iznan H. ;
Alashhab, Ziyad R. .
SENSORS, 2022, 22 (09)
[4]   Congestion control in wireless sensor and 6LoWPAN networks: toward the Internet of Things [J].
Al-Kashoash, Hayder A. A. ;
Kharrufa, Harith ;
Al-Nidawi, Yaarob ;
Kemp, Andrew H. .
WIRELESS NETWORKS, 2019, 25 (08) :4493-4522
[5]   Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm [J].
Alamiedy, Taief Alaa ;
Anbar, Mohammed ;
Alqattan, Zakaria N. M. ;
Alzubi, Qusay M. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (09) :3735-3756
[6]   Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks [J].
Albishari, Mohammed ;
Li, Mingchu ;
Zhang, Runfa ;
Almosharea, Esmail .
JOURNAL OF SUPERCOMPUTING, 2023, 79 (03) :2626-2653
[7]   Towards sustainable smart IoT applications architectural elements and design: opportunities, challenges, and open directions [J].
Ali, Zainab H. ;
Ali, Hesham A. .
JOURNAL OF SUPERCOMPUTING, 2021, 77 (06) :5668-5725
[8]   Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP [J].
Almusaylim, Zahrah A. ;
Jhanjhi, N. Z. ;
Alhumam, Abdulaziz .
SENSORS, 2020, 20 (21) :1-25
[9]   A Lightweight Scheme for Mitigating RPL Version Number Attacks in IoT Networks [J].
Alsukayti, Ibrahim S. ;
Singh, Aman .
IEEE ACCESS, 2022, 10 :111115-111133
[10]  
Ambarkar Smita Sanjay, 2021, Proceeding of First Doctoral Symposium on Natural Computing Research (DSNCR 2020). Lecture Notes in Networks and Systems (LNNS 169), P301, DOI 10.1007/978-981-33-4073-2_29