Investigating Routing Protocol Attacks on Low Power and Lossy IoT Networks (original) (raw)

References

  1. Furstenau LB, Rodrigues YPR, Sott MK, Leivas P, Dohan MS, Lopez-Robles JR, Cobo MJ, Bragazzi NL, Choo K-KR. Internet of things: conceptual network structure, main challenges and future directions. Digit Commun Netw. 2023;9(3):677–87.
    Article Google Scholar
  2. Ahmed S, Khan M. Securing the internet of things (IoT): a comprehensive study on the intersection of cybersecurity, privacy, and connectivity in the IoT ecosystem. AI IoT Fourth Ind Revol Rev. 2023;13(9):1–17.
    Google Scholar
  3. Santhosh Kumar SVN, Selvi M, Kannan A, et al. A comprehensive survey on machine learning-based intrusion detection systems for secure communication in internet of things. Comput Intell Neurosci. 2023;2023:1–24.
    Article Google Scholar
  4. Heidari A, Jamali MAJ. Internet of things intrusion detection systems: a comprehensive review and future directions. Cluster Comput. 2023;26(6):3753–80.
    Article Google Scholar
  5. Seyfollahi A, Ghaffari A. A review of intrusion detection systems in RPL routing protocol based on machine learning for internet of things applications. Wirel Commun Mob Comput. 2021;1–32:2021.
    Google Scholar
  6. Hassan T, Asim M, Baker T, Hassan J, Tariq N. CTrust-RPL: a control layer-based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks-based Internet of Things applications. Trans Emerg Telecommun Technol. 2021;32(3):1–20.
    Google Scholar
  7. Medjek F, Tandjaoui D, Djedjig N, Romdhani I. Multicast DIS attack mitigation in RPL-based IoT-LLNs. J Inf Secur Appl. 2021;61: 102939.
    Google Scholar
  8. Kamble A, Malemath VS, Patil D. Security attacks and secure routing protocols in RPL-based Internet of Things: survey. In: 2017 International conference on emerging trends and innovation in ICT (ICEI); 2017. p. 33–39. IEEE.
  9. Sahay R, Geethakumari G, Mitra B. A novel blockchain based framework to secure IoT-LLNs against routing attacks. Computing. 2020;102:2445–70.
    Article Google Scholar
  10. Alatersh FM, Sati S, Sullabi M. Impact of network topologies on RPL performance. In: 2021 22nd International Arab conference on information technology (ACIT); 2021. p. 1–7. IEEE.
  11. Hunde E, Deac D, Thielemans S, Carlier M, Steenhaut K, Braeken A, Dobrota V. Time slotted channel hopping and contikimac for ipv6 multicast-enabled wireless sensor networks. Sensors. 2021;21(5):1–26.
    Google Scholar
  12. Shabbir G, Akram A, Iqbal MM, Jabbar S, Alfawair M, Chaudhry J. Network performance enhancement of multi-sink enabled low power lossy networks in SDN based Internet of Things. Int J Parallel Program. 2020;48(2):367–98.
    Article Google Scholar
  13. Le A, Loo J, Lasebae A, Aiash M, Luo Y. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. Int J Commun Syst. 2012;25(9):1189–212.
    Article Google Scholar
  14. Musaddiq A, Zikria YB, Kim SW, et al. Routing protocol for low-power and lossy networks for heterogeneous traffic network. EURASIP J Wirel Commun Netw. 2020;2020(1):1–23.
    Article Google Scholar
  15. Kumar A, Sharma S, Goyal N, Gupta SK, Kumari S, Kumar S. Energy-efficient fog computing in Internet of Things based on routing protocol for low-power and lossy network with Contiki. Int J Commun Syst. 2022;35(4): e5049.
    Article Google Scholar
  16. Bang AO, Rao UP, Kaliyar P, Conti M. Assessment of routing attacks and mitigation techniques with RPL control messages: a survey. ACM Comput Surv (CSUR). 2022;55(2):1–36.
    Article Google Scholar
  17. Agiollo A, Conti M, Kaliyar P, Lin T-N, Pajola L. DETONAR: detection of routing attacks in RPL-based IoT. IEEE Trans Netw Serv Manag. 2021;18(2):1178–90.
    Article Google Scholar
  18. Al-Amiedy TA, Anbar M, Belaton B, Bahashwan AA, Hasbullah IH, Aladaileh MA, Mukhaini GAL. A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things. Internet of Things. 2023;22: 100741.
    Article Google Scholar
  19. Sofi A, Regita JJ, Rane B, Lau HH. Structural health monitoring using wireless smart sensor network—an overview. Mech Syst Signal Process. 2022;163:108113.
    Article Google Scholar
  20. Verma A, Ranga V. Mitigation of DIS flooding attacks in RPL-based 6LoWPAN networks. Trans Emerg Telecommun Technol. 2020;31(2): e3802.
    Article Google Scholar
  21. Sharma G, Grover J, Verma A. Performance evaluation of mobile RPL-based IoT networks under version number attack. Comput Commun. 2023;197:12–22.
    Article Google Scholar
  22. Zahariadis T, Leligou HC, Trakadas P, Voliotis S. Trust management in wireless sensor networks. Eur Trans Telecommun. 2010;21(4):386–95.
    Article Google Scholar
  23. Heidari A, Jamali MAJ. Internet of Things intrusion detection systems: a comprehensive review and future directions. Cluster Comput. 2022;26:3753–80.
    Article Google Scholar
  24. Kiran U. IDS to detect worst parent selection attack in RPL-based IoT network. In: 2022 14th International conference on COMmunication Systems and NETworkS (COMSNETS); 2022. p. 769–73. IEEE.
  25. Althubaity A, Ammar R, Han S. Detecting rules-related attacks in RPL-based resource-constrained wireless networks. In 2020 IEEE international symposium on signal processing and information technology (ISSPIT); 2020. p. 1–8. IEEE.
  26. Khan AS, Khan AQ, Iqbal N, Sarwar M, Mahmood A, Shoaib MA. Distributed fault detection and isolation in second order networked systems in a cyber-physical environment. ISA Trans. 2020;103:131–42.
    Article Google Scholar
  27. Chakravarty S, Portokalidis G, Polychronakis M, Keromytis AD. Detection and analysis of eavesdropping in anonymous communication networks. Int J Inf Secur. 2015;14:205–20.
    Article Google Scholar
  28. Simoglou G, Violettas G, Petridou S, Mamatas L. Intrusion detection systems for RPL security: a comparative analysis. Comput Secur. 2021;104: 102219.
    Article Google Scholar
  29. Almusaylim ZA, Alhumam A, Jhanjhi NZ. Proposing a secure RPL based internet of things routing protocol: a review. Ad Hoc Netw. 2020;101:102096.
    Article Google Scholar
  30. Liu Y, Peng W, Jinshu S. A study of IP prefix hijacking in cloud computing networks. Secur Commun Netw. 2014;7(11):2201–10.
    Article Google Scholar
  31. tuz Zahra F, Jhanjhi NZ, Brohi SN, Malik NA, Humayun M. Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning. In: 2020 2nd International conference on computer and information sciences (ICCIS); 2020. p. 1–6.
  32. Verma A, Ranga V. Security of RPL based 6LoWPAN networks in the Internet of Things: a review. IEEE Sens J. 2020;20(11):5666–90.
    Article Google Scholar
  33. Boudouaia MA, Ali-Pacha A, Abouaissa A, Lorenz P. Security against rank attack in RPL protocol. IEEE Netw. 2020;34(4):133–9.
    Article Google Scholar
  34. Ghaleb B, Al-Dubai AY, Ekonomou E, Alsarhan A, Nasser Y, Mackenzie LM, Boukerche A. A survey of limitations and enhancements of the IPv6 routing protocol for low-power and lossy networks: a focus on core operations. IEEE Commun Surv Tutor. 2019;21(2):1607–35.
    Article Google Scholar
  35. Rajasekar VR, Rajkumar S. A study on impact of DIS flooding attack on RPL-based 6LowPAN network. Microprocess Microsyst. 2022;94: 104675.
    Article Google Scholar
  36. Verma A, Ranga V. Addressing flooding attacks in IPv6-based low power and lossy networks. In: TENCON 2019—2019 IEEE Region 10 Conference (TENCON); 2019. p. 552–7.
  37. Chang RKC. Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun Mag. 2002;40(10):42–51.
    Article Google Scholar
  38. Mayzaud A, Badonnel R, Chrisment I. A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE Trans Netw Serv Manag. 2017;14(2):472–86.
    Article Google Scholar
  39. Seth AD, Biswas S, Dhar AK. LDES: detector design for version number attack detection using linear temporal logic based on discrete event system. Int J Inf Secur. 2023;22:961–85.
    Article Google Scholar
  40. Wallgren L, Raza S, Voigt T. Routing attacks and countermeasures in the RPL-based internet of things. Int J Distribut Sens Netw. 2013;9(8): 794326.
    Article Google Scholar
  41. Bouyeddou B, Kadri B, Harrou F, Sun Y. DDOS-attacks detection using an efficient measurement-based statistical mechanism. Eng Sci Technol. 2020;23(4):870–8.
    Google Scholar
  42. Le A, Loo J, Lasebae A, Vinel A, Chen Y, Chai M. The impact of rank attack on network topology of Routing Protocol for Low-power and lossy networks. IEEE Sens J. 2013;13(10):3685–92.
    Article Google Scholar
  43. Le A, Loo J, Luo Y, Lasebae A. The impacts of internal threats towards Routing Protocol for Low power and lossy network performance. In: 2013 IEEE symposium on computers and communications (ISCC); 2013. p. 789–94.
  44. Rehman A, Khan MM, Lodhi MA, Hussain FB. Rank attack using objective function in RPL for low power and lossy networks. In: 2016 International conference on industrial informatics and computer systems (CIICS); 2016. p. 1–5. IEEE.
  45. Dvir A, Buttyan L, et al. VeRA-version number and rank authentication in RPL. In: 2011 IEEE eighth international conference on mobile ad-hoc and sensor systems; 2011. p. 709–14. IEEE.
  46. Guo G. A lightweight countermeasure to DIS attack in RPL routing protocol. In: 2021 IEEE 11th Annual computing and communication workshop and conference (CCWC); 2021. p. 0753–8. IEEE.
  47. Sharma D, Mishra I, Jain S. A detailed classification of routing attacks against RPL in Internet of Things. Int J Adv Res Ideas Innov Technol. 2017;3(1):692–703.
    Google Scholar
  48. Sahay R, Geethakumari G, Mitra B, Sahoo I. Efficient framework for detection of version number attack in Internet of Things. In: Intelligent systems design and applications: 18th international conference on intelligent systems design and applications (ISDA 2018) held in Vellore, India, December 6–8, 2018, vol. 2; 2020. p. 480–92. Springer.
  49. Almusaylim ZA, Jhanjhi NZ, Alhumam A. Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP. Sensors. 2020;20(21):5997.
    Article Google Scholar
  50. Shafique U, Khan A, Rehman A, Bashir F, Alam M. Detection of rank attack in routing protocol for low power and lossy networks. Ann Telecommun. 2018;73:429–38.
    Article Google Scholar
  51. Le A, Loo J, Luo Y, Lasebae A. Specification-based ids for securing RPL from topology attacks. In: 2011 IFIP wireless days (WD); 2011. p. 1–3. IEEE.

Download references