Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy

被引:7
作者
Alfriehat, Nadia A. [1 ]
Anbar, Mohammed [1 ]
Karuppayah, Shankar [1 ]
Rihan, Shaza Dawood Ahmed [2 ]
Alabsi, Basim Ahmad [2 ]
Momani, Alaa M. [3 ]
机构
[1] Univ Sains Malaysia USM, Natl Adv IPv6 Ctr NAv6, George Town 11800, Penang, Malaysia
[2] Najran Univ, Appl Coll, Najran 61441, Saudi Arabia
[3] Univ City Sharjah, Skyline Univ Coll, Sch Comp, Sharjah, U Arab Emirates
关键词
Security; Protocols; Wireless sensor networks; Internet of Things; Reviews; Routing; Throughput; Intrusion detection; Low-power electronics; Research and development; IoT; RPL protocol; VNA; intrusion detection system; security; LLN; WIRELESS SENSOR NETWORKS; INTRUSION DETECTION SYSTEMS; 6LOWPAN NETWORKS; RPL; PROTOCOLS;
D O I
10.1109/ACCESS.2024.3368633
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The internet of things (IoT) is an emerging technological advancement with significant implications. It connects a wireless sensor or node network via low-power and lossy networks (LLN). The routing protocol over a low-power and lossy network (RPL) is the fundamental component of LLN. Its lightweight design effectively addresses the limitations imposed by bandwidth, energy, and memory on both LLNs and IoT devices. Notwithstanding its efficacy, RPL introduces susceptibilities, including the version number attack (VNA), which underscores the need for IoT systems to implement effective security protocols. This work reviews and categorizes the security mechanisms proposed in the literature to detect VNA against RPL-based IoT networks. The existing mechanisms are thoroughly discussed and analyzed regarding their performance, datasets, implementation details, and limitations. Furthermore, a qualitative comparison is presented to benchmark this work against existing studies, showcasing its uniqueness. Finally, this work analyzes research gaps and proposes future research avenues.
引用
收藏
页码:31136 / 31158
页数:23
相关论文
共 50 条
  • [31] Performance Assessment of the Routing Protocol for Low Power and Lossy Networks
    Lamaazi, Hanane
    Benamar, Nabil
    Imaduddin, Muhammad Iqbal
    Jara, Antonio J.
    2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2015, : 187 - 194
  • [32] Routing protocol for Low-Power and Lossy Networks for heterogeneous traffic network
    Musaddiq, Arslan
    Zikria, Yousaf Bin
    Zulqarnain
    Kim, Sung Won
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [33] Transient Multipath routing protocol for low power and lossy networks
    Lodhi, M. Ali
    Rehman, Abdul
    Khan, Meer M.
    Asfand-e-yar, Muhammad
    Hussain, Faisal Bashir
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04): : 2002 - 2019
  • [34] Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks
    Verma, Abhishek
    Ranga, Virender
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 552 - 557
  • [35] Evaluating routing metric composition approaches for QoS differentiation in low power and lossy networks
    Panagiotis Karkazis
    Panagiotis Trakadas
    Helen C. Leligou
    Lambros Sarakis
    Ioannis Papaefstathiou
    Theodore Zahariadis
    Wireless Networks, 2013, 19 : 1269 - 1284
  • [36] Reliable Data Delivery With the IETF Routing Protocol for Low-Power and Lossy Networks
    Ancillotti, Emilio
    Bruno, Raffaele
    Conti, Marco
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (03) : 1864 - 1877
  • [37] Energy-efficient fog computing in Internet of Things based on Routing Protocol for Low-Power and Lossy Network with Contiki
    Kumar, Arun
    Sharma, Sharad
    Goyal, Nitin
    Gupta, Sachin Kumar
    Kumari, Saru
    Kumar, Sachin
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (04)
  • [38] Detection of rank attack in routing protocol for Low Power and Lossy Networks
    Usman Shafique
    Abid Khan
    Abdur Rehman
    Faisal Bashir
    Masoom Alam
    Annals of Telecommunications, 2018, 73 : 429 - 438
  • [39] Wormhole Attack Detection In Routing Protocol For Low Power Lossy Networks
    Ahsan, Muhammad Saad
    Bhutta, Muhammad Nasir Mumtaz
    Maqsood, Moazam
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2017, : 58 - 67
  • [40] Detection of rank attack in routing protocol for Low Power and Lossy Networks
    Shafique, Usman
    Khan, Abid
    Rehman, Abdur
    Bashir, Faisal
    Alam, Masoom
    ANNALS OF TELECOMMUNICATIONS, 2018, 73 (7-8) : 429 - 438