Investigating Routing Protocol Attacks on Low Power and Lossy IoT Networks (original) (raw)
References
Furstenau LB, Rodrigues YPR, Sott MK, Leivas P, Dohan MS, Lopez-Robles JR, Cobo MJ, Bragazzi NL, Choo K-KR. Internet of things: conceptual network structure, main challenges and future directions. Digit Commun Netw. 2023;9(3):677–87. Article Google Scholar
Ahmed S, Khan M. Securing the internet of things (IoT): a comprehensive study on the intersection of cybersecurity, privacy, and connectivity in the IoT ecosystem. AI IoT Fourth Ind Revol Rev. 2023;13(9):1–17. Google Scholar
Santhosh Kumar SVN, Selvi M, Kannan A, et al. A comprehensive survey on machine learning-based intrusion detection systems for secure communication in internet of things. Comput Intell Neurosci. 2023;2023:1–24. Article Google Scholar
Heidari A, Jamali MAJ. Internet of things intrusion detection systems: a comprehensive review and future directions. Cluster Comput. 2023;26(6):3753–80. Article Google Scholar
Seyfollahi A, Ghaffari A. A review of intrusion detection systems in RPL routing protocol based on machine learning for internet of things applications. Wirel Commun Mob Comput. 2021;1–32:2021. Google Scholar
Hassan T, Asim M, Baker T, Hassan J, Tariq N. CTrust-RPL: a control layer-based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks-based Internet of Things applications. Trans Emerg Telecommun Technol. 2021;32(3):1–20. Google Scholar
Medjek F, Tandjaoui D, Djedjig N, Romdhani I. Multicast DIS attack mitigation in RPL-based IoT-LLNs. J Inf Secur Appl. 2021;61: 102939. Google Scholar
Kamble A, Malemath VS, Patil D. Security attacks and secure routing protocols in RPL-based Internet of Things: survey. In: 2017 International conference on emerging trends and innovation in ICT (ICEI); 2017. p. 33–39. IEEE.
Sahay R, Geethakumari G, Mitra B. A novel blockchain based framework to secure IoT-LLNs against routing attacks. Computing. 2020;102:2445–70. Article Google Scholar
Alatersh FM, Sati S, Sullabi M. Impact of network topologies on RPL performance. In: 2021 22nd International Arab conference on information technology (ACIT); 2021. p. 1–7. IEEE.
Hunde E, Deac D, Thielemans S, Carlier M, Steenhaut K, Braeken A, Dobrota V. Time slotted channel hopping and contikimac for ipv6 multicast-enabled wireless sensor networks. Sensors. 2021;21(5):1–26. Google Scholar
Shabbir G, Akram A, Iqbal MM, Jabbar S, Alfawair M, Chaudhry J. Network performance enhancement of multi-sink enabled low power lossy networks in SDN based Internet of Things. Int J Parallel Program. 2020;48(2):367–98. Article Google Scholar
Le A, Loo J, Lasebae A, Aiash M, Luo Y. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. Int J Commun Syst. 2012;25(9):1189–212. Article Google Scholar
Musaddiq A, Zikria YB, Kim SW, et al. Routing protocol for low-power and lossy networks for heterogeneous traffic network. EURASIP J Wirel Commun Netw. 2020;2020(1):1–23. Article Google Scholar
Kumar A, Sharma S, Goyal N, Gupta SK, Kumari S, Kumar S. Energy-efficient fog computing in Internet of Things based on routing protocol for low-power and lossy network with Contiki. Int J Commun Syst. 2022;35(4): e5049. Article Google Scholar
Bang AO, Rao UP, Kaliyar P, Conti M. Assessment of routing attacks and mitigation techniques with RPL control messages: a survey. ACM Comput Surv (CSUR). 2022;55(2):1–36. Article Google Scholar
Agiollo A, Conti M, Kaliyar P, Lin T-N, Pajola L. DETONAR: detection of routing attacks in RPL-based IoT. IEEE Trans Netw Serv Manag. 2021;18(2):1178–90. Article Google Scholar
Al-Amiedy TA, Anbar M, Belaton B, Bahashwan AA, Hasbullah IH, Aladaileh MA, Mukhaini GAL. A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things. Internet of Things. 2023;22: 100741. Article Google Scholar
Sofi A, Regita JJ, Rane B, Lau HH. Structural health monitoring using wireless smart sensor network—an overview. Mech Syst Signal Process. 2022;163:108113. Article Google Scholar
Verma A, Ranga V. Mitigation of DIS flooding attacks in RPL-based 6LoWPAN networks. Trans Emerg Telecommun Technol. 2020;31(2): e3802. Article Google Scholar
Sharma G, Grover J, Verma A. Performance evaluation of mobile RPL-based IoT networks under version number attack. Comput Commun. 2023;197:12–22. Article Google Scholar
Zahariadis T, Leligou HC, Trakadas P, Voliotis S. Trust management in wireless sensor networks. Eur Trans Telecommun. 2010;21(4):386–95. Article Google Scholar
Heidari A, Jamali MAJ. Internet of Things intrusion detection systems: a comprehensive review and future directions. Cluster Comput. 2022;26:3753–80. Article Google Scholar
Kiran U. IDS to detect worst parent selection attack in RPL-based IoT network. In: 2022 14th International conference on COMmunication Systems and NETworkS (COMSNETS); 2022. p. 769–73. IEEE.
Althubaity A, Ammar R, Han S. Detecting rules-related attacks in RPL-based resource-constrained wireless networks. In 2020 IEEE international symposium on signal processing and information technology (ISSPIT); 2020. p. 1–8. IEEE.
Khan AS, Khan AQ, Iqbal N, Sarwar M, Mahmood A, Shoaib MA. Distributed fault detection and isolation in second order networked systems in a cyber-physical environment. ISA Trans. 2020;103:131–42. Article Google Scholar
Chakravarty S, Portokalidis G, Polychronakis M, Keromytis AD. Detection and analysis of eavesdropping in anonymous communication networks. Int J Inf Secur. 2015;14:205–20. Article Google Scholar
Simoglou G, Violettas G, Petridou S, Mamatas L. Intrusion detection systems for RPL security: a comparative analysis. Comput Secur. 2021;104: 102219. Article Google Scholar
Almusaylim ZA, Alhumam A, Jhanjhi NZ. Proposing a secure RPL based internet of things routing protocol: a review. Ad Hoc Netw. 2020;101:102096. Article Google Scholar
Liu Y, Peng W, Jinshu S. A study of IP prefix hijacking in cloud computing networks. Secur Commun Netw. 2014;7(11):2201–10. Article Google Scholar
tuz Zahra F, Jhanjhi NZ, Brohi SN, Malik NA, Humayun M. Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning. In: 2020 2nd International conference on computer and information sciences (ICCIS); 2020. p. 1–6.
Verma A, Ranga V. Security of RPL based 6LoWPAN networks in the Internet of Things: a review. IEEE Sens J. 2020;20(11):5666–90. Article Google Scholar
Boudouaia MA, Ali-Pacha A, Abouaissa A, Lorenz P. Security against rank attack in RPL protocol. IEEE Netw. 2020;34(4):133–9. Article Google Scholar
Ghaleb B, Al-Dubai AY, Ekonomou E, Alsarhan A, Nasser Y, Mackenzie LM, Boukerche A. A survey of limitations and enhancements of the IPv6 routing protocol for low-power and lossy networks: a focus on core operations. IEEE Commun Surv Tutor. 2019;21(2):1607–35. Article Google Scholar
Rajasekar VR, Rajkumar S. A study on impact of DIS flooding attack on RPL-based 6LowPAN network. Microprocess Microsyst. 2022;94: 104675. Article Google Scholar
Verma A, Ranga V. Addressing flooding attacks in IPv6-based low power and lossy networks. In: TENCON 2019—2019 IEEE Region 10 Conference (TENCON); 2019. p. 552–7.
Chang RKC. Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun Mag. 2002;40(10):42–51. Article Google Scholar
Mayzaud A, Badonnel R, Chrisment I. A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE Trans Netw Serv Manag. 2017;14(2):472–86. Article Google Scholar
Seth AD, Biswas S, Dhar AK. LDES: detector design for version number attack detection using linear temporal logic based on discrete event system. Int J Inf Secur. 2023;22:961–85. Article Google Scholar
Wallgren L, Raza S, Voigt T. Routing attacks and countermeasures in the RPL-based internet of things. Int J Distribut Sens Netw. 2013;9(8): 794326. Article Google Scholar
Bouyeddou B, Kadri B, Harrou F, Sun Y. DDOS-attacks detection using an efficient measurement-based statistical mechanism. Eng Sci Technol. 2020;23(4):870–8. Google Scholar
Le A, Loo J, Lasebae A, Vinel A, Chen Y, Chai M. The impact of rank attack on network topology of Routing Protocol for Low-power and lossy networks. IEEE Sens J. 2013;13(10):3685–92. Article Google Scholar
Le A, Loo J, Luo Y, Lasebae A. The impacts of internal threats towards Routing Protocol for Low power and lossy network performance. In: 2013 IEEE symposium on computers and communications (ISCC); 2013. p. 789–94.
Rehman A, Khan MM, Lodhi MA, Hussain FB. Rank attack using objective function in RPL for low power and lossy networks. In: 2016 International conference on industrial informatics and computer systems (CIICS); 2016. p. 1–5. IEEE.
Dvir A, Buttyan L, et al. VeRA-version number and rank authentication in RPL. In: 2011 IEEE eighth international conference on mobile ad-hoc and sensor systems; 2011. p. 709–14. IEEE.
Guo G. A lightweight countermeasure to DIS attack in RPL routing protocol. In: 2021 IEEE 11th Annual computing and communication workshop and conference (CCWC); 2021. p. 0753–8. IEEE.
Sharma D, Mishra I, Jain S. A detailed classification of routing attacks against RPL in Internet of Things. Int J Adv Res Ideas Innov Technol. 2017;3(1):692–703. Google Scholar
Sahay R, Geethakumari G, Mitra B, Sahoo I. Efficient framework for detection of version number attack in Internet of Things. In: Intelligent systems design and applications: 18th international conference on intelligent systems design and applications (ISDA 2018) held in Vellore, India, December 6–8, 2018, vol. 2; 2020. p. 480–92. Springer.
Almusaylim ZA, Jhanjhi NZ, Alhumam A. Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP. Sensors. 2020;20(21):5997. Article Google Scholar
Shafique U, Khan A, Rehman A, Bashir F, Alam M. Detection of rank attack in routing protocol for low power and lossy networks. Ann Telecommun. 2018;73:429–38. Article Google Scholar
Le A, Loo J, Luo Y, Lasebae A. Specification-based ids for securing RPL from topology attacks. In: 2011 IFIP wireless days (WD); 2011. p. 1–3. IEEE.