Proposing a Secure RPL based Internet of Things Routing Protocol: A Review

被引:81
作者
Almusaylim, Zahrah A. [1 ]
Alhumam, Abdulaziz [1 ]
Jhanjhi, N. Z. [2 ]
机构
[1] King Faisal Univ, Dept Comp Sci, Al Hasa, Saudi Arabia
[2] Taylors Univ, Sch Comp Sci & Engn SCE, Lakeside Campus, Subang Jaya, Selangor, Malaysia
关键词
IoT; Smart cities; Security; RPL; Rank attack; Version number attack; LOW-POWER; INTRUSION DETECTION; LOSSY NETWORKS; ENHANCEMENTS; CHALLENGES; ATTACKS; FOCUS;
D O I
10.1016/j.adhoc.2020.102096
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the Internet of Things (IoT) research domain attracts the researchers, due to its extensive collection of applications and ease in deploying in several domains of real life, particularly for environments that are considered critical such as E-health, smart homes, and smart cities. Things in smart cities are intractable via the Internet. These things are naturally deployed in a distributed environment wirelessly. They become vulnerable to the diverse security attacks that can adversely influence their proper functionalities at any time. The stated problem severity even becomes higher when they are deployed in smart cities. In addition, it is very likely to compromise data while transferring from one source to another until reaching the destination during data routing. Existing Routing Protocols for Low Power and Lossy Networks (RPL) are considered lightweight and secure routing protocols for IoT devices, which offer a slight safeguard against innumerable forms of RPL routing attacks. Based on the nature of the IoT network, being resource constraints, the conventional routing techniques do not suit them at all. The IoT routing security is therefore, a challenging task. This review aims to elaborate on the current research literature, opportunities and research gaps of secure RPL routing protocols. Where mainly considering the Rank and Version number attacks types for IoT applications. Further, the review extravagant the need for a new secure RPL protocol to address the security issues of IoT applications for smart cities particularly based on available literature. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:17
相关论文
共 100 条
[1]   A Distributed and Cooperative Verification Mechanism to Defend against DODAG Version Number Attack in RPL [J].
Ahmed, Firoz ;
Ko, Young-Bae .
PECCS: PROCEEDINGS OF THE 6TH INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND EMBEDDED COMPUTING AND COMMUNICATION SYSTEMS, 2016, :55-62
[2]   SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things [J].
Airehrour, David ;
Gutierrez, Jairo A. ;
Ray, Sayan Kumar .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 :860-876
[3]  
Airehrour D, 2016, 2016 26TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P115, DOI 10.1109/ATNAC.2016.7878793
[4]   Secure routing for internet of things: A survey [J].
Airehrour, David ;
Gutierrez, Jairo ;
Ray, Sayan Kumar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :198-213
[5]  
Ali SSS, 2016, CLASSROOM INSIGHTS: LANGUAGE LEARNING SKILLS,STRATEGIES AND PRACTICES, P25
[6]  
Aljarrah E, 2016, 2016 INT C ENG MIS
[7]  
Almusaylim Z. A., 2019, WIRELESS PERS COMMUN, P1
[8]  
Almusaylim ZA, 2018, 2018 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS)
[9]   A review on smart home present state and challenges: linked to context-awareness internet of things (IoT) [J].
Almusaylim, Zahrah A. ;
Zaman, Noor .
WIRELESS NETWORKS, 2019, 25 (06) :3193-3204
[10]   The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks [J].
Anhtuan Le ;
Loo, Jonathan ;
Lasebae, Aboubaker ;
Vinel, Alexey ;
Chen, Yue ;
Chai, Michael .
IEEE SENSORS JOURNAL, 2013, 13 (10) :3685-3692