Intrusion detection systems for RPL security: A comparative analysis

被引:42
作者
Simoglou, George [1 ]
Violettas, George [1 ]
Petridou, Sophia [1 ]
Mamatas, Lefteris [1 ]
机构
[1] Univ Macedonia, Egnatia 156, Thessaloniki, Greece
关键词
IoT; RPL routing protocol; Security; Attacks; Intrusion detection systems; Comparative analysis; INTERNET; PROTOCOL; THINGS; ATTACK;
D O I
10.1016/j.cose.2021.102219
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is an emerging technology that has seen remarkable blossom over the last years. The growing interest for IPv6 constrained networks has made the Routing Protocol for Low Power and Lossy Networks (RPL) the standard routing solution, which has gained significant attention and maturity in the literature. However, due to the net-works' open and possibly unattended environment of operation, as well as to the nodes' constraints, the security of the protocol is a challenging issue, currently under thorough investigation. New and innovative Intrusion Detection Systems (IDSs) have been proposed in the literature over the last years to address the protocol's security issues. In that regard, our survey paper: i) begins with extracting a set of design requirements for RPL-related IDSs based on discussing the diversity of attacks on the protocol and investigating their impact; ii) continues with identifying best practices and gaps in an IDS design which are derived by studying the evolution of the related bibliography (2013-2020); and iii) concludes with a number of guidelines extracted once we map the 22 IDSs under study to the attacks they en-counter and compare them in line with the design requirements we introduce. Our analysis considers feedback from the corresponding authors for a deeper investigation. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:21
相关论文
共 74 条
[11]   GENI: A federated testbed for innovative network experiments [J].
Berman, Mark ;
Chase, Jeffrey S. ;
Landweber, Lawrence ;
Nakao, Akihiro ;
Ott, Max ;
Raychaudhuri, Dipankar ;
Ricci, Robert ;
Seskar, Ivan .
COMPUTER NETWORKS, 2014, 61 :5-23
[12]   Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach [J].
Bostani, Hamid ;
Sheikhan, Mansour .
COMPUTER COMMUNICATIONS, 2017, 98 :52-71
[13]  
Cervantes C, 2015, PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), P606, DOI 10.1109/INM.2015.7140344
[14]   A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things [J].
Deshmukh-Bhosale, Snehal ;
Sonavane, Santosh S. .
12TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING (INTER-ENG 2018), 2019, 32 :840-847
[15]   Fast and scalable pattern matching for network intrusion detection systems [J].
Dharmapurikar, Sarang ;
Lockwood, John W. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (10) :1781-1792
[16]  
Dunkels A, 2004, CONF LOCAL COMPUT NE, P455
[17]   RPL in a nutshell: A survey [J].
Gaddour, Olfa ;
Koubaa, Anis .
COMPUTER NETWORKS, 2012, 56 (14) :3163-3178
[18]  
Gara F, 2017, INT WIREL COMMUN, P276, DOI 10.1109/IWCMC.2017.7986299
[19]   Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues [J].
Granjal, Jorge ;
Monteiro, Edmundo ;
Silva, Jorge Sa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) :1294-1312
[20]  
Ioulianou P, 2020, DENIAL OF SERVICE AT, P374, DOI doi: 101007/978-3-030-42048-2_24