Intrusion detection systems for RPL security: A comparative analysis

被引:42
作者
Simoglou, George [1 ]
Violettas, George [1 ]
Petridou, Sophia [1 ]
Mamatas, Lefteris [1 ]
机构
[1] Univ Macedonia, Egnatia 156, Thessaloniki, Greece
关键词
IoT; RPL routing protocol; Security; Attacks; Intrusion detection systems; Comparative analysis; INTERNET; PROTOCOL; THINGS; ATTACK;
D O I
10.1016/j.cose.2021.102219
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is an emerging technology that has seen remarkable blossom over the last years. The growing interest for IPv6 constrained networks has made the Routing Protocol for Low Power and Lossy Networks (RPL) the standard routing solution, which has gained significant attention and maturity in the literature. However, due to the net-works' open and possibly unattended environment of operation, as well as to the nodes' constraints, the security of the protocol is a challenging issue, currently under thorough investigation. New and innovative Intrusion Detection Systems (IDSs) have been proposed in the literature over the last years to address the protocol's security issues. In that regard, our survey paper: i) begins with extracting a set of design requirements for RPL-related IDSs based on discussing the diversity of attacks on the protocol and investigating their impact; ii) continues with identifying best practices and gaps in an IDS design which are derived by studying the evolution of the related bibliography (2013-2020); and iii) concludes with a number of guidelines extracted once we map the 22 IDSs under study to the attacks they en-counter and compare them in line with the design requirements we introduce. Our analysis considers feedback from the corresponding authors for a deeper investigation. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:21
相关论文
共 74 条
[1]   A Distributed and Cooperative Verification Mechanism to Defend against DODAG Version Number Attack in RPL [J].
Ahmed, Firoz ;
Ko, Young-Bae .
PECCS: PROCEEDINGS OF THE 6TH INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND EMBEDDED COMPUTING AND COMMUNICATION SYSTEMS, 2016, :55-62
[2]   Secure routing for internet of things: A survey [J].
Airehrour, David ;
Gutierrez, Jairo ;
Ray, Sayan Kumar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :198-213
[3]   The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks [J].
Anhtuan Le ;
Loo, Jonathan ;
Lasebae, Aboubaker ;
Vinel, Alexey ;
Chen, Yue ;
Chai, Michael .
IEEE SENSORS JOURNAL, 2013, 13 (10) :3685-3692
[4]  
[Anonymous], 2011, NETWORK
[5]  
[Anonymous], 2012, NET ARCHITECT SERV
[6]  
[Anonymous], 2012, SEC INT C EM SEC IN
[7]  
[Anonymous], 2015, International Journal of Computer Applications, DOI DOI 10.5120/21565-4589
[8]   Evaluating and improving the scalability of RPL security in the Internet of Things [J].
Arena, Antonio ;
Perazzo, Pericle ;
Vallati, Carlo ;
Dini, Gianluca ;
Anastasi, Giuseppe .
COMPUTER COMMUNICATIONS, 2020, 151 :119-132
[9]  
Aris A, 2016, IEEE IFIP NETW OPER, P776, DOI 10.1109/NOMS.2016.7502897
[10]  
AYDOGAN E, 2019, 2019 15 IEEE INT WOR