Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT

被引:22
|
作者
Avila, Karen [1 ]
Jabba, Daladier [1 ]
Gomez, Javier [2 ]
机构
[1] Univ Norte, Dept Ingn Sistemas, Barranquilla 081007, Colombia
[2] Univ Nacl Autonoma Mexico, Dept Ingn Telecomunicac, Mexico City 04510, DF, Mexico
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 18期
关键词
security in RPL; attacks in RPL; wireless sensor networks; internet of things; INTERNET; THINGS; ATTACK;
D O I
10.3390/app10186472
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The Internet of things (IoT) is a concept that has gained traction over the last decade. IoT networks have evolved around the wireless sensor network (WSN), and the following research looks at relevant IoT concepts and the different security issues that occur specifically at the network layer. This analysis is performed using a structured literature review (SLR). This form of bibliographic review has been a trend in recent years. Its strength is the performance of a bibliometric analysis that allows studying both trends in the line of research that you want to address and the relevant authors. This SLR reviews 53 proposals between 2011 and 2020, whose contribution is to mitigate attacks in the RPL (Routing Protocol for Low-Power and Lossy Networks) protocol. The revised proposals emerged after selecting keywords and databases in which to apply the search. Initially, approximately 380 research works appeared, for which it was necessary to continue using filters to refine the proposals to be included. After reading titles and abstracts, 53 papers were finally selected. In addition to analyzing the attacks mitigated in the RPL protocol, it is intended to identify the trend by which these attacks are reduced, as a result of the review, nine attacks have been found: rank, blackhole, selective forwarding, wormhole, DODAG (Destination-Oriented Directed Acyclic Graph) version number, DAO (Destination Advertisement Object) inconsistency, DIO (DODAG Information Object) suppression, Sybil, and sinkhole. Each of the 53 proposals analyzed in this review has an associated mitigation strategy, these strategies have been categorized into four groups, based on authentication or cryptography, based on network monitoring, based on secure parent node selection and other. According to the results, the authors' primary mitigation strategy is based on network monitoring, with 30%. This review also identifies the principal authors and countries that need the development of this line of research.
引用
下载
收藏
页数:20
相关论文
共 50 条
  • [1] RPL-Based Routing Protocols in IoT Applications: A Review
    Kharrufa, Harith
    Al-Kashoash, Hayder A. A.
    Kemp, Andrew H.
    IEEE SENSORS JOURNAL, 2019, 19 (15) : 5952 - 5967
  • [2] Security Attacks and Secure Routing Protocols in RPL-based Internet of Things: Survey
    Kamble, Arvind
    Malemath, Virendra S.
    Patil, Deepika
    2017 INTERNATIONAL CONFERENCE ON EMERGING TRENDS & INNOVATION IN ICT (ICEI), 2017, : 33 - 39
  • [3] RPL-based attack detection approaches in IoT networks: review and taxonomy
    Alfriehat, Nadia
    Anbar, Mohammed
    Aladaileh, Mohammed
    Hasbullah, Iznan
    Shurbaji, Tamarah A.
    Karuppayah, Shankar
    Almomani, Ammar
    ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (09)
  • [4] An Intrusion Detection System for RPL-Based IoT Networks
    Ribera, Eric Garcia
    Alvarez, Brian Martinez
    Samuel, Charisma
    Ioulianou, Philokypros P.
    Vassilakis, Vassilios G.
    ELECTRONICS, 2022, 11 (23)
  • [5] Classification of Intrusions in RPL-Based IoT Networks: A Comparison
    Nandhini, P. S.
    Kuppuswami, S.
    Malliga, S.
    MOBILE COMPUTING AND SUSTAINABLE INFORMATICS, 2022, 68 : 849 - 862
  • [6] DETONAR: Detection of Routing Attacks in RPL-Based IoT
    Agiollo, Andrea
    Conti, Mauro
    Kaliyar, Pallavi
    Lin, Tsung-Nan
    Pajola, Luca
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1178 - 1190
  • [7] RPL-Based IoT Networks under Simple and Complex Routing Security Attacks: An Experimental Study
    Alsukayti, Ibrahim S.
    Alreshoodi, Mohammed
    APPLIED SCIENCES-BASEL, 2023, 13 (08):
  • [8] Security Vulnerabilities and Countermeasures in the RPL-based Internet of Things
    Yang, Wei
    Wang, Yuan
    Lai, Zhixiang
    Wan, Yadong
    Cheng, Zhuo
    2018 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC 2018), 2018, : 49 - 54
  • [9] RM-RPL: reliable mobility management framework for RPL-based IoT systems
    Seyfollahi, Ali
    Mainuddin, Md
    Taami, Tania
    Ghaffari, Ali
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 4449 - 4468
  • [10] A Lightweight Cooperative Intrusion Detection System for RPL-based IoT
    Azzaoui, Hanane
    Boukhamla, Akram Zine Eddine
    Perazzo, Pericle
    Alazab, Mamoun
    Ravi, Vinayakumar
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 134 (04) : 2235 - 2258