A Comparative Analysis of Attacks on RPL in Internet of Things Networks
DOI:
https://doi.org/10.64882/ijrt.v13.i3.765Keywords:
Routing Protocol Security, Internet of Things, IoT, RPL, Low Power and Lossy Networks, LLNsAbstract
The Routing Protocol for Low-Power and Lossy Networks (RPL) is the standard routing protocol widely adopted in Internet of Things (IoT) and Wireless Sensor Network (WSN) environments. While RPL is a lightweight protocol offering efficient routing functionality, it provides only basic security mechanisms, which makes it susceptible to a variety of security attacks. Ensuring security in IoT networks is particularly challenging due to their resource-constrained nature and their direct connectivity to the largely unsecured Internet. This survey presents a comprehensive review of security issues associated with RPL, building upon existing research while addressing security challenges specific to IoT environments. The study proposes a classification of RPL attacks based on the fundamental security principles of Confidentiality, Integrity, and Availability (CIA). Additionally, the survey examines existing countermeasures for identified attacks and provides theoretical solutions, derived from the literature, for attacks that have not yet been thoroughly evaluated. The paper concludes by highlighting open research challenges and outlining future research directions necessary to enhance the security of RPL for Internet of Things applications
References
Bhalaji, N., K. S. Hariharasudan, and K. Aashika, "A trust based mechanism to combat blackhole attack in RPL protocol", In International Conference on Intelligent Computing and Communication Technologies, pp. 457-464, 2019.
Carolina V. L. Mendoza and Joao H. Kleinschmidt, "Defense for selective attacks in the IoT with a distributed trust management scheme", In 2016 IEEE International Symposium on Consumer Electronics (ISCE), pp. 53-54. IEEE, 2016.
Cervantes, Christian, Diego Poplade, Michele Nogueira, and Aldri Santos. "Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things", IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 606- 611. 2015.
Christian Cervantes, Diego Poplade, Michele Nogueira and Aldri Santos "Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things", In 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 606-611, 2015.
Danilo Evangelista, Farouk Mezghani, Michele Nogueira, Aldri Santos,"Evaluation of Sybil attack detection approaches in the Internet of Things content dissemination", In 2016 Wireless Days (WD), pp. 1-6, 2016.
Firoz Ahmed and Young-Bae Ko, "Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks", Security and Communication Networks, Vol. 9, Issue 18, pp 5143-5154, 2016.
George W. Kibirige and Camilius Sanga, "A survey on detection of sinkhole attack in wireless sensor network", arXiv preprint arXiv:1505.01941, 2015.
Himanshu B. Patel and Devesh C. Jinwala, "Blackhole detection in 6LoWPAN based internet of things: an anomaly based approach",In TENCON 2019-2019 IEEE Region 10 Conference (TENCON), pp. 947-954, 2019
Hongliang Zhu1, Zhihua Zhang, Juan Du1, Shoushan Luo1 and Yang Xin, "Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks", International Journal of Distributed Sensor Networks, Vol. 14, Issue 11, pp. 1-15, 2018
Kuan Zhang, Xiaohui Liang, Rongxing Lu and Xuemin Shen, "Sybil attacks and their defenses in the internet of things", IEEE Internet of Things Journal, Vol.1, Issue 5, pp. 372-383, 2014.
Leovigildo Sanchez-Casado, Gabriel Macia-Fernandez, Pedro Garcia-Teodoro, and Nils Aschenbruck, "Identification of contamination zones for sinkhole detection in MANETs", Journal of Network and Computer Applications, pp. 62-77, 2015.
Linus Wallgren, Shahid Raza and Thiemo Voigt, “Routing Attacks and Countermeasures in the RPL-Based Internet of things”, International journal of Distributed Sensor Networks, pp. 1-11, 2013.
Mahmood Alzubaidi, Mohammed Anbar and Sabri M. Hanshi, "Neighbor-passive monitoring technique for detecting sinkhole attacks in RPL networks", In Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence, pp. 173-182, 2017.
Maliheh Bahekmat, Mohammad Hossein Yaghmaee, Ashraf Sadat HeydariYazdi, and Sanaz Sadeghi, "A novel algorithm for detecting sinkhole attacks in WSNs", International Journal of Computer Theory and Engineering Vol. 4, Issue 3, pp. 418 422, 2012.
MelancyMascarenhas and Vineet Jain, "A survey on mechanisms for detecting sinkhole attack on 6LoWPAN in IoT", International Journal of Latest Trends in Engineering and Technology, Vol. 10, Issue 1, pp.134-137, 2018.
Md. IftekharHussain, “Internet of Things: challenges and research opportunities”, DOI
1007/s40012-016-0136-6, pp. 1-9, 2016.
Mian Ahmad Jan,Priyadarsi Nanda, Xiangjian He and Ren Ping Liu, "A Sybil attack detection scheme for a forest wildfire monitoring application", Future Generation Computer Systems, Vol. 80, pp. 613-626, 2018.
Sabah Suhail, Shashi Raj Pandey and ChoongSeon Hong, "Detection of Selective Forwarding Attack in RPL-Based Internet of Things through Provenance", pp 965967, 2018.
Rintaro Harada;Naotaka Shibata;Shin Kaneko;Kazuaki Honda;Jun Terada;Yota Ishida;Kunio Akashi;Toshiyuki Miyachi Quick Suppression of DDoS Attacks by Frame Priority Control in IoT Backhaul With Construction of Mirai-Based Attacks IEEE Access Year: 2022 | Volume: 10 | Journal Article | Publisher: IEEE
Md. Ashraful Islam;Masaki Himuro;Kengo Iokibe;Yoshitaka Toyota Common-mode Current Reduction by Applying Mode-conversion Suppression Technique to Power Delivery Network as Side-channel Attack Countermeasure 2021 International
Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)
Yutaka Abe;Kazuhiro Minami Matching Attacks on Non-deterministic Algorithms for Cell Suppression Problem for Tabular Data 2022 IEEE International Conference on Big Data (Big Data) 2022 IEEE International Conference on Big Data (Big Data) Year: 2022 | Conference IEEE
Rashmi Sahay, G. Geethakumari, BarshaMitra and V. Thejas, "Exponential smoothing based approach for detection of blackhole attacks in IoT", In 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1-6, 2018.
Sabeen Tahir, Sheikh Tahir Bakhsh and Rayan A Alsemmeari, "An intrusion detection system for the prevention of an active sinkhole routing attack in Internet of things", International Journal of Distributed Sensor Networks Vol 15, Issue 11, pp. 1-10, 2019.
Shoukat Ali, Dr. Muazzam A Khan, Jawad Ahmad, Asad W. Malik, and Anisur Rehman, "Detection and prevention of Black Hole Attacks in IOT & WSN", In 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC), pp. 217-226, 2018.
Sohail Abbas, "An Efficient Sybil Attack Detection for Internet of Things", In World Conference on Information Systems and Technologies, pp. 339-349, 2019.
Stephen. R and Arockiam. L, “RDAID: Rank Increased Attack IDentification Algorithm for Internet of Things”, International Journal of Scientific Research in Computer Science Applications and Management Studies, Volume. 7, Issue 3, pp 1-5, 2018.
Stephen. R and Arockiam. L, “RDAIDRPL: Rank Increased Attack IDentification Algorithm for Avoiding Loop in the RPL DODAG”, International Journal of Pure and Applied Mathematics, Vol. 119, Issue 16, pp.1-8, 2018.
Surinder Singh, Hardeep Singh Saini, "Detection Techniques for Selective Forwarding Attack in Wireless Sensor Networks", International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, Issue 6S, pp. 380-383, 2019.
Vipindev Adat and B. B. Gupta, “Security in Internet of Things: issues, challenges, taxonomy, and architecture”, DOI 10.1007/s11235-017-0345-9, pp. 1-99, 2017.
Downloads
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.




