Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy

被引:7
作者
Alfriehat, Nadia A. [1 ]
Anbar, Mohammed [1 ]
Karuppayah, Shankar [1 ]
Rihan, Shaza Dawood Ahmed [2 ]
Alabsi, Basim Ahmad [2 ]
Momani, Alaa M. [3 ]
机构
[1] Univ Sains Malaysia USM, Natl Adv IPv6 Ctr NAv6, George Town 11800, Penang, Malaysia
[2] Najran Univ, Appl Coll, Najran 61441, Saudi Arabia
[3] Univ City Sharjah, Skyline Univ Coll, Sch Comp, Sharjah, U Arab Emirates
关键词
Security; Protocols; Wireless sensor networks; Internet of Things; Reviews; Routing; Throughput; Intrusion detection; Low-power electronics; Research and development; IoT; RPL protocol; VNA; intrusion detection system; security; LLN; WIRELESS SENSOR NETWORKS; INTRUSION DETECTION SYSTEMS; 6LOWPAN NETWORKS; RPL; PROTOCOLS;
D O I
10.1109/ACCESS.2024.3368633
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The internet of things (IoT) is an emerging technological advancement with significant implications. It connects a wireless sensor or node network via low-power and lossy networks (LLN). The routing protocol over a low-power and lossy network (RPL) is the fundamental component of LLN. Its lightweight design effectively addresses the limitations imposed by bandwidth, energy, and memory on both LLNs and IoT devices. Notwithstanding its efficacy, RPL introduces susceptibilities, including the version number attack (VNA), which underscores the need for IoT systems to implement effective security protocols. This work reviews and categorizes the security mechanisms proposed in the literature to detect VNA against RPL-based IoT networks. The existing mechanisms are thoroughly discussed and analyzed regarding their performance, datasets, implementation details, and limitations. Furthermore, a qualitative comparison is presented to benchmark this work against existing studies, showcasing its uniqueness. Finally, this work analyzes research gaps and proposes future research avenues.
引用
收藏
页码:31136 / 31158
页数:23
相关论文
共 50 条
  • [41] Selective Authentication Based Geographic Opportunistic Routing in Wireless Sensor Networks for Internet of Things Against DoS Attacks
    Lyu, Chen
    Zhang, Xiaomei
    Liu, Zhiqiang
    Chi, Chi-Hung
    IEEE ACCESS, 2019, 7 : 31068 - 31082
  • [42] The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks
    Anhtuan Le
    Loo, Jonathan
    Lasebae, Aboubaker
    Vinel, Alexey
    Chen, Yue
    Chai, Michael
    IEEE SENSORS JOURNAL, 2013, 13 (10) : 3685 - 3692
  • [43] A comprehensive survey on the security of low power wide area networks for the Internet of Things
    Stanco, Giovanni
    Navarro, Annalisa
    Frattini, Flavio
    Ventre, Giorgio
    Botta, Alessio
    ICT EXPRESS, 2024, 10 (03): : 519 - 552
  • [44] Mitigating Stealthy Jamming Attacks in Low-power and Lossy Wireless Networks
    Heo, Jeongyoon
    Kim, Jung-Jun
    Paek, Jeongyeup
    Bahk, Saewoong
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2018, 20 (02) : 219 - 230
  • [45] A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things
    Al-Amiedy, Taief Alaa
    Anbar, Mohammed
    Belaton, Bahari
    Kabla, Arkan Hammoodi Hasan
    Hasbullah, Iznan H.
    Alashhab, Ziyad R.
    SENSORS, 2022, 22 (09)
  • [46] Meta-Learner-Based Approach for Detecting Attacks on Internet of Things Networks
    Rihan, Shaza Dawood Ahmed
    Anbar, Mohammed
    Alabsi, Basim Ahmad
    SENSORS, 2023, 23 (19)
  • [47] GROLL: Geographic Routing for Low Power and Lossy IoT Networks
    Won, Myounggyu
    Zhang, Wei
    Chen, Chien-An
    Stoleru, Radu
    INTERNET OF THINGS, 2020, 9
  • [48] A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-Power and Lossy Networks: A Focus on Core Operations
    Ghaleb, Baraq
    Al-Dubai, Ahmed Y.
    Ekonomou, Elias
    Alsarhan, Ayoub
    Nasser, Youssef
    Mackenzie, Lewis M.
    Boukerche, Azzedine
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1607 - 1635
  • [49] Efficient routing protocol for IoT networks based on fog computing and routing protocol of low-power lossy networks
    Verma, Ankit
    Deswal, Suman
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2023, 16 (03) : 176 - 184
  • [50] A secure routing protocol for low power and lossy networks based 6LoWPAN networks to mitigate DIS flooding attacks
    Abhinaya, E. V.
    Sudhakar, B.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,