Intrusion detection systems for RPL security: A comparative analysis

被引:34
|
作者
Simoglou, George [1 ]
Violettas, George [1 ]
Petridou, Sophia [1 ]
Mamatas, Lefteris [1 ]
机构
[1] Univ Macedonia, Egnatia 156, Thessaloniki, Greece
关键词
IoT; RPL routing protocol; Security; Attacks; Intrusion detection systems; Comparative analysis; INTERNET; PROTOCOL; THINGS; ATTACK;
D O I
10.1016/j.cose.2021.102219
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is an emerging technology that has seen remarkable blossom over the last years. The growing interest for IPv6 constrained networks has made the Routing Protocol for Low Power and Lossy Networks (RPL) the standard routing solution, which has gained significant attention and maturity in the literature. However, due to the net-works' open and possibly unattended environment of operation, as well as to the nodes' constraints, the security of the protocol is a challenging issue, currently under thorough investigation. New and innovative Intrusion Detection Systems (IDSs) have been proposed in the literature over the last years to address the protocol's security issues. In that regard, our survey paper: i) begins with extracting a set of design requirements for RPL-related IDSs based on discussing the diversity of attacks on the protocol and investigating their impact; ii) continues with identifying best practices and gaps in an IDS design which are derived by studying the evolution of the related bibliography (2013-2020); and iii) concludes with a number of guidelines extracted once we map the 22 IDSs under study to the attacks they en-counter and compare them in line with the design requirements we introduce. Our analysis considers feedback from the corresponding authors for a deeper investigation. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:21
相关论文
共 50 条
  • [31] An Intrusion Detection System using Deep Cellular Learning Automata and Semantic Hierarchy for Enhancing RPL Protocol Security
    Mohammad Shirafkan
    Ali Shahidinejad
    Mostafa Ghobaei-Arani
    Cluster Computing, 2023, 26 : 2443 - 2461
  • [32] Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT
    Abhishek Verma
    Virender Ranga
    Wireless Personal Communications, 2019, 108 : 1571 - 1594
  • [33] An Intrusion Detection System using Deep Cellular Learning Automata and Semantic Hierarchy for Enhanceing RPL Protocol Security
    Shirafkan, Mohammad
    Shahidinejad, Ali
    Ghobaei-Arani, Mostafa
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (04): : 2443 - 2461
  • [34] Intrusion detection: Introduction to intrusion detection and security information management
    Debar, H
    Viinikka, J
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 207 - 236
  • [35] An Intrusion Detection System for RPL-Based IoT Networks
    Ribera, Eric Garcia
    Alvarez, Brian Martinez
    Samuel, Charisma
    Ioulianou, Philokypros P.
    Vassilakis, Vassilios G.
    ELECTRONICS, 2022, 11 (23)
  • [36] Security challenges in intrusion detection
    Jouad, Mohammed
    Diouani, Sara
    Houmani, Hanane
    Zaki, Ali
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 350 - 360
  • [37] Internet security and intrusion detection
    Kemmerer, RA
    Vigna, G
    25TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2003, : 748 - 749
  • [38] Intrusion Detection Using Rule Based Approach in RPL Networks
    Belavagi, Manjula C
    Muniyal, Balachandra
    IAENG International Journal of Computer Science, 2023, 50 (03)
  • [39] A Review of Intrusion Detection Systems in RPL Routing Protocol Based on Machine Learning for Internet of Things Applications
    Seyfollahi, Ali
    Ghaffari, Ali
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [40] Technical Analysis of Network Intrusion Detection System on the Information Security
    Yu, Sheng
    2015 3RD INTERNATIONAL CONFERENCE ON SOCIAL SCIENCES RESEARCH (SSR 2015), 2015, 13 : 190 - 194