Intrusion detection systems for RPL security: A comparative analysis

被引:34
|
作者
Simoglou, George [1 ]
Violettas, George [1 ]
Petridou, Sophia [1 ]
Mamatas, Lefteris [1 ]
机构
[1] Univ Macedonia, Egnatia 156, Thessaloniki, Greece
关键词
IoT; RPL routing protocol; Security; Attacks; Intrusion detection systems; Comparative analysis; INTERNET; PROTOCOL; THINGS; ATTACK;
D O I
10.1016/j.cose.2021.102219
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is an emerging technology that has seen remarkable blossom over the last years. The growing interest for IPv6 constrained networks has made the Routing Protocol for Low Power and Lossy Networks (RPL) the standard routing solution, which has gained significant attention and maturity in the literature. However, due to the net-works' open and possibly unattended environment of operation, as well as to the nodes' constraints, the security of the protocol is a challenging issue, currently under thorough investigation. New and innovative Intrusion Detection Systems (IDSs) have been proposed in the literature over the last years to address the protocol's security issues. In that regard, our survey paper: i) begins with extracting a set of design requirements for RPL-related IDSs based on discussing the diversity of attacks on the protocol and investigating their impact; ii) continues with identifying best practices and gaps in an IDS design which are derived by studying the evolution of the related bibliography (2013-2020); and iii) concludes with a number of guidelines extracted once we map the 22 IDSs under study to the attacks they en-counter and compare them in line with the design requirements we introduce. Our analysis considers feedback from the corresponding authors for a deeper investigation. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] Security detection of network intrusion: application of cluster analysis method
    Yang, W. H.
    COMPUTER OPTICS, 2020, 44 (04) : 660 - 664
  • [42] Intelligent Border Security Intrusion Detection using IoT and Embedded systems
    ALshukri, Dawoud
    Lavanya, Vidhya R.
    Sumesh, E. P.
    Krishnan, Pooja
    2019 4TH MEC INTERNATIONAL CONFERENCE ON BIG DATA AND SMART CITY (ICBDSC), 2019, : 178 - 180
  • [43] Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
    Mahajan, Varun
    Peddoju, Sateesh K.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 829 - 834
  • [44] A security policy and Network Cartography based Intrusion Detection and Prevention Systems
    Meharouech, Sourour
    Bouhoula, Adel
    Abbes, Tarek
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 279 - 291
  • [45] Security Implications of Network Address Translation on Intrusion Detection and Prevention Systems
    Sourour, Meharouech
    Adel, Bouhoula
    Tarek, Abbes
    2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 1 - 5
  • [46] Enhancing interoperability of security operation center to heterogeneous intrusion detection systems
    Lin, ACC
    Wong, HK
    Wu, TC
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 216 - 221
  • [47] Machine Learning Techniques for Intrusion Detection: A Comparative Analysis
    Hamid, Yasir
    Sugumaran, M.
    Journaux, Ludovic
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [48] Analysis of Approaches to the Construction of Intrusion Detection Systems
    Nikolskaya, Kseniya Yu.
    Ivanov, Sergey A.
    Golodov, Valentin A.
    Mursalimov, Ainur I.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 82 - 83
  • [49] Machine learning methods for cyber security intrusion detection: Datasets and comparative study
    Kilincer, Ilhan Firat
    Ertam, Fatih
    Sengur, Abdulkadir
    COMPUTER NETWORKS, 2021, 188
  • [50] Comparative Analysis of ML Classifiers for Network Intrusion Detection
    Mahfouz, Ahmed M.
    Venugopal, Deepak
    Shiva, Sajjan G.
    FOURTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 2, 2020, 1027 : 193 - 207