Secure Routing Protocol for Low Power and Lossy Networks Against Rank Attack: A Systematic Review

被引:0
作者
Al-Qaisi, Laila [1 ]
Hassan, Suhaidi [1 ]
Zakaria, Nur Haryani Binti [1 ]
机构
[1] Univ Utara Malaysia, Sch Comp, InterNetWorks Res Lab, Kedah Darul Aman, Malaysia
关键词
Wireless sensor networks; internet of things (IoT); routing security; RPL; objective function; RPL-BASED INTERNET; INTRUSION DETECTION; THINGS;
D O I
10.14569/IJACSA.2022.0130539
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) is witnessing massive widespread along in almost all aspects of life. IoT is defined as a network of interconnected devices applied in various environments including smart cities, transportation, health, industries, military, and agriculture. Its main purpose is to simplify the exchange and collect data from and to deployment environments. Due to their small size and cost-effectiveness, Wireless Sensor Networks (WSN) form one of the core technologies deployed in IoT. Yet, things interconnected with each other and exchanging data are prone to different kinds of security attacks. As a result, it is possible to compromise data while transmitted from source to destination through nodes. Routing Protocol for Low Power and Lossy Networks (RPL) offers only slight protection against routing attacks, but having a network with limited energy sources, processors, and memory, besides being deployed in unattended nature and hostile environment requires more scalable security measures. This paper focuses on investigating the problem of security provisioning in RPL. As such, a Systematic Literature Review (SLR) of security mechanisms proposed for RPL will be discussed. An extensive search was conducted on various online databases, then findings were filtered by reviewing abstracts, introduction, and conclusion. Finally, a summary of recent research work is presented. This work is important to highlight various aspects of securing RPL and get an initial insight for studying them.
引用
收藏
页码:330 / 339
页数:10
相关论文
共 56 条
  • [1] Producer mobility support in information-centric networks: research background and open issues
    Abrar, Ahmad
    Arif, Ahmad Suki Che Mohamed
    Zaini, Khuzairi Mohd
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2022, 28 (03) : 312 - 336
  • [2] Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP
    Almusaylim, Zahrah A.
    Jhanjhi, N. Z.
    Alhumam, Abdulaziz
    [J]. SENSORS, 2020, 20 (21) : 1 - 25
  • [3] Proposing a Secure RPL based Internet of Things Routing Protocol: A Review
    Almusaylim, Zahrah A.
    Alhumam, Abdulaziz
    Jhanjhi, N. Z.
    [J]. AD HOC NETWORKS, 2020, 101
  • [4] Althubaity Areej, 2020, 2020 IEEE Conference on Industrial Cyberphysical Systems (ICPS), P168, DOI 10.1109/ICPS48405.2020.9274726
  • [5] [Anonymous], 2004, PROCEDURES PERFORMIN
  • [6] Evaluating and improving the scalability of RPL security in the Internet of Things
    Arena, Antonio
    Perazzo, Pericle
    Vallati, Carlo
    Dini, Gianluca
    Anastasi, Giuseppe
    [J]. COMPUTER COMMUNICATIONS, 2020, 151 : 119 - 132
  • [7] A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions
    Asharf, Javedz
    Moustafa, Nour
    Khurshid, Hasnat
    Debie, Essam
    Haider, Waqas
    Wahab, Abdul
    [J]. ELECTRONICS, 2020, 9 (07)
  • [8] Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT
    Avila, Karen
    Jabba, Daladier
    Gomez, Javier
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (18):
  • [9] Babbar H., 2020, INTEGRATION WSN IOT, P1
  • [10] RPL rank based-attack mitigation scheme in IoT environment
    Boudouaia, Mohammed Amine
    Abouaissa, Abdelhafid
    Ali-Pacha, Adda
    Benayache, Ayoub
    Lorenz, Pascal
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (13)