Security Attacks and Secure Routing Protocols in RPL-based Internet of Things: Survey

被引:0
|
作者
Kamble, Arvind [1 ]
Malemath, Virendra S. [2 ]
Patil, Deepika [1 ]
机构
[1] SSDGCT Sanjay Ghodawat Grp Inst Kolhapur, Comp Sci & Engn Dept, Kolhapur, Maharashtra, India
[2] KLES Coll Engn & Technol Belgaum, Comp Sci & Engn Dept, Belgaum, India
关键词
Internet of Things; LLN; RPL; Routing; Security; MOBILE AD HOC;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet of Things (IoT) could be described as the pervasive and global network which aids and provides a system for the monitoring and control of the physical world through the collection, processing and analysis of generated data by IoT sensor devices. It is projected that by 2020 the number of connected devices is estimated to grow exponentially to 50 billion. The growing interest for the Internet of Things is contributing to the large-scale deployment of Low power and Lossy Networks (LLN). These networks support communications amongst sensor devices from the real world and their interconnection to the Internet. An open standard routing protocol called RPL has been specified by the Internet Engineering Task Force (IETF) in order to address the specific properties and constraints of these networks. However, this protocol is exposed to a large variety of attacks. Their consequences can be quite significant in terms of network performance and resources It is apparent that security will pose a fundamental enabling factor for the successful deployment and use of most IoT applications and in particular secure routing among IoT sensor nodes thus, mechanisms need to be designed to provide secure routing communications for devices enabled by the IoT. In this paper, we identified the taxonomy of the attack and describe how topology attacks are prevented in RPl and further discuss secure routing protocols used in the internet of Things (IoT).
引用
收藏
页码:33 / 39
页数:7
相关论文
共 50 条
  • [11] Replay attacks in RPL-based Internet of Things: Comparative and empirical study
    Albinali, Hussah
    Azzedin, Farag
    [J]. Computer Networks, 2025, 257
  • [12] An Anomaly-Based IDS for Detecting Attacks in RPL-Based Internet of Things
    Farzaneh, Behnam
    Montazeri, Mohammad Ali
    Jamali, Shahram
    [J]. 2019 5TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2019, : 61 - 66
  • [13] A Security Routing Protocol for Internet of Things Based on RPL
    Ma, Guojun
    Li, Xing
    Pei, Qingqi
    Li, Zi
    [J]. 2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 209 - 213
  • [14] Collaborative Detection and Prevention of Sybil Attacks against RPL-Based Internet of Things
    Khan, Muhammad Ali
    Bin Rais, Rao Naveed
    Khalid, Osman
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (01): : 827 - 843
  • [15] DETONAR: Detection of Routing Attacks in RPL-Based IoT
    Agiollo, Andrea
    Conti, Mauro
    Kaliyar, Pallavi
    Lin, Tsung-Nan
    Pajola, Luca
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1178 - 1190
  • [16] RPL-Based Routing Protocols in IoT Applications: A Review
    Kharrufa, Harith
    Al-Kashoash, Hayder A. A.
    Kemp, Andrew H.
    [J]. IEEE SENSORS JOURNAL, 2019, 19 (15) : 5952 - 5967
  • [17] Detection and Mitigation of RPL Routing Attacks in Internet of Things
    Manne, Venkata Ramana Jyothisree
    Sreekanth, S.
    [J]. Proceedings of the 2022 9th International Conference on Computing for Sustainable Global Development, INDIACom 2022, 2022, : 481 - 485
  • [18] Proposing a Secure RPL based Internet of Things Routing Protocol: A Review
    Almusaylim, Zahrah A.
    Alhumam, Abdulaziz
    Jhanjhi, N. Z.
    [J]. AD HOC NETWORKS, 2020, 101
  • [19] Load balancing for RPL-based Internet of Things: A review
    Pancaroglu, Doruk
    Sen, Sevil
    [J]. AD HOC NETWORKS, 2021, 116
  • [20] Energy-Aware Adaptive Trickle Timer Algorithm for RPL-based Routing in the Internet of Things
    Musaddiq, Arslan
    Bin Zikria, Yousaf
    Kim, Sung Won
    [J]. 2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 4 - 9