ISSN:1390-9266 e-ISSN:1390-9134 LAJC 2025
47
DOI:
LATIN-AMERICAN JOURNAL OF COMPUTING (LAJC), Vol XII, Issue 1, January 2025
10.5281/zenodo.14449371
LC. Sejaphala, V. Malele, and F. Lugayizi,
“A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things”,
Latin-American Journal of Computing (LAJC), vol. 12, no. 1, 2025.
(Ed.)^(Eds.): ‘Book ML-based Detection of Rank and Blackhole
Attacks in RPL Networks’ (2022, edn.), pp. 338-343
[14] Ioulianou, P.P., Vassilakis, V.G., and Shahandashti, S.F.: ‘A Trust-
Based Intrusion Detection System for RPL Networks: Detecting a
Combination of Rank and Blackhole Attacks’, in Editor (Ed.)^(Eds.):
‘Book A Trust-Based Intrusion Detection System for RPL Networks:
Detecting a Combination of Rank and Blackhole Attacks’ (2022, edn.),
pp. 124-153
[15] Ioannou, C., and Vassiliou, V.: ‘Accurate Detection of Sinkhole
Attacks in IoT Networks Using Local Agents’, in Editor (Ed.)^(Eds.):
‘Book Accurate Detection of Sinkhole Attacks in IoT Networks Using
Local Agents’ (2020, edn.), pp. 1-8
[16] Moreira, C.M., and Kaddoum, G.: ‘QL vs. SARSA: Performance
Evaluation for Intrusion Prevention Systems in Software-Defined IoT
Networks’, in Editor (Ed.)^(Eds.): ‘Book QL vs. SARSA: Performance
Evaluation for Intrusion Prevention Systems in Software-Defined IoT
Networks’ (2023, edn.), pp. 500-504
[17] Qureshi, K.N., Rana, S.S., Ahmed, A., and Jeon, G.: ‘A novel and
secure attacks detection framework for smart cities industrial internet
of things’, Sustainable Cities and Society, 2020, 61, pp. 102343
[18] Raoof, A., Lung, C.H., and Matrawy, A.: ‘Securing RPL Using
Network Coding: The Chained Secure Mode (CSM)’, IEEE Internet of
Things Journal, 2022, 9, (7), pp. 4888-4898
[19] Pu, C., and Hajjar, S.: ‘Mitigating Forwarding misbehaviors in RPL-
based low power and lossy networks’, in Editor (Ed.)^(Eds.): ‘Book
Mitigating Forwarding misbehaviors in RPL-based low power and
lossy networks’ (2018, edn.), pp. 1-6
[20] Chen, B., Li, Y., and Mashima, D.: ‘Analysis and enhancement of RPL
under packet drop attacks’, in Editor (Ed.)^(Eds.): ‘Book Analysis and
enhancement of RPL under packet drop attacks’ (2018, edn.), pp. 167-
174
[21] Wadhaj, I., Ghaleb, B., Thomson, C., Al-Dubai, A., and Buchanan,
W.J.: ‘Mitigation Mechanisms Against the DAO Attack on the Routing
Protocol for Low Power and Lossy Networks (RPL)’, IEEE Access,
2020, 8, pp. 43665-43675
[22] Alsukayti, I.S., and Singh, A.: ‘A Lightweight Scheme for Mitigating
RPL Version Number Attacks in IoT Networks’, IEEE Access, 2022,
10, pp. 111115-111133
[23] Rouissat, M., Belkheir, M., Alsukayti, I.S., and Mokaddem, A.: ‘A
Lightweight Mitigation Approach against a New Inundation Attack in
RPL-Based IoT Networks’, in Editor (Ed.)^(Eds.): ‘Book A
Lightweight Mitigation Approach against a New Inundation Attack in
RPL-Based IoT Networks’ (2023, edn.), pp.
[24] A. Almusaylim, Z., Jhanjhi, N.Z., and Alhumam, A.: ‘Detection and
Mitigation of RPL Rank and Version Number Attacks in the Internet
of Things: SRPL-RP’, in Editor (Ed.)^(Eds.): ‘Book Detection and
Mitigation of RPL Rank and Version Number Attacks in the Internet
of Things: SRPL-RP’ (2020, edn.), pp.
[25] Deshmukh-Bhosale, S., and Sonavane, S.S.: ‘A Real-Time Intrusion
Detection System for Wormhole Attack in the RPL based Internet of
Things’, Procedia Manufacturing, 2019, 32, pp. 840-847
[26] Manne, V.R.J., and Sreekanth, S.: ‘Detection and Mitigation of RPL
Routing Attacks in Internet of Things’, in Editor (Ed.)^(Eds.): ‘Book
Detection and Mitigation of RPL Routing Attacks in Internet of
Things’ (2022, edn.), pp. 481-485
[27] Agiollo, A., Conti, M., Kaliyar, P., Lin, T.N., and Pajola, L.:
‘DETONAR: Detection of Routing Attacks in RPL-Based IoT’, IEEE
Transactions on Network and Service Management, 2021, 18, (2), pp.
1178-1190
[28] Choudhary, S., and Kesswani, N.: ‘Detection and Prevention of
Routing Attacks in Internet of Things’, in Editor (Ed.)^(Eds.): ‘Book
Detection and Prevention of Routing Attacks in Internet of Things’
(2018, edn.), pp. 1537-1540
[29] Garcia Ribera, E., Martinez Alvarez, B., Samuel, C., Ioulianou, P.P.,
and Vassilakis, V.G.: ‘An Intrusion Detection System for RPL-Based
IoT Networks’, in Editor (Ed.)^(Eds.): ‘Book An Intrusion Detection
System for RPL-Based IoT Networks’ (2022, edn.), pp.
[30] Yılmaz, S., Aydogan, E., and Sen, S.: ‘A Transfer Learning Approach
for Securing Resource-Constrained IoT Devices’, IEEE Transactions
on Information Forensics and Security, 2021, 16, pp. 4405-4418
[31] Momand, M.D., Mohsin, M.K., and Ihsanulhaq: ‘Machine Learning-
based Multiple Attack Detection in RPL over IoT’, in Editor
(Ed.)^(Eds.): ‘Book Machine Learning-based Multiple Attack
Detection in RPL over IoT’ (2021, edn.), pp. 1-8
[32] Kamaldeep, Malik, M., Dutta, M., and Granjal, J.: ‘IoT-Sentry: A
Cross-Layer-Based Intrusion Detection System in Standardized
Internet of Things’, IEEE Sensors Journal, 2021, 21, (24), pp. 28066-
28076
[33] 33 Pasikhan, A.M., Clark, J.A., and Gope, P.: ‘Incremental hybrid
intrusion detection for 6LoWPAN’, Computers & Security, 2023, 135,
pp. 103447
[34] Raghavendra, T., Anand, M., Selvi, M., Thangaramya, K., Santhosh
Kumar, S.V.N., and Kannan, A.: ‘An Intelligent RPL attack detection
using Machine Learning-Based Intrusion Detection System for Internet
of Things’, Procedia Computer Science, 2022, 215, pp. 61-70
[35] Rabhi, S., Abbes, T., and Zarai, F.: ‘IoT Routing Attacks Detection
Using Machine Learning Algorithms’, Wireless Personal
Communications, 2023, 128, (3), pp. 1839-1857
[36] Choukri, W., Lamaazi, H., and Benamar, N.: ‘RPL rank attack
detection using Deep Learning’, in Editor (Ed.)^(Eds.): ‘Book RPL
rank attack detection using Deep Learning’ (2020, edn.), pp. 1-6
[37] Verma, A., and Ranga, V.: ‘ELNIDS: Ensemble Learning based
Network Intrusion Detection System for RPL based Internet of
Things’, in Editor (Ed.)^(Eds.): ‘Book ELNIDS: Ensemble Learning
based Network Intrusion Detection System for RPL based Internet of
Things’ (2019, edn.), pp. 1-6
[38] Pasikhani, A.M., Clark, J.A., and Gope, P.: ‘Reinforcement-Learning-
based IDS for 6LoWPAN’, in Editor (Ed.)^(Eds.): ‘Book
Reinforcement-Learning-based IDS for 6LoWPAN’ (2021, edn.), pp.
1049-1060
[39] Cakir, S., Toklu, S., and Yalcin, N.: ‘RPL Attack Detection and
Prevention in the Internet of Things Networks Using a GRU Based
Deep Learning’, IEEE Access, 2020, 8, pp. 183678-183689
[40] Al Sawafi, Y., Touzene, A., and Hedjam, R.: ‘Hybrid Deep Learning-
Based Intrusion Detection System for RPL IoT Networks’, in Editor
(Ed.)^(Eds.): ‘Book Hybrid Deep Learning-Based Intrusion Detection
System for RPL IoT Networks’ (2023, edn.), pp.
[41] Zahra, F., Jhanjhi, N.Z., Brohi, S.N., Khan, N.A., Masud, M., and
AlZain, M.A.: ‘Rank and Wormhole Attack Detection Model for RPL-
Based Internet of Things Using Machine Learning’, in Editor
(Ed.)^(Eds.): ‘Book Rank and Wormhole Attack Detection Model for
RPL-Based Internet of Things Using Machine Learning’ (2022, edn.),
pp.
[42] Alazab, A., Khraisat, A., Singh, S., Bevinakoppa, S., and Mahdi, O.A.:
‘Routing Attacks Detection in 6LoWPAN-Based Internet of Things’,
in Editor (Ed.)^(Eds.): ‘Book Routing Attacks Detection in
6LoWPAN-Based Internet of Things’ (2023, edn.), pp.
[43] Zahra, F., Jhanjhi, N.Z., Khan, N.A., Brohi, S.N., Masud, M., and
Aljahdali, S.: ‘Protocol-Specific and Sensor Network-Inherited Attack
Detection in IoT Using Machine Learning’, in Editor (Ed.)^(Eds.):
‘Book Protocol-Specific and Sensor Network-Inherited Attack
Detection in IoT Using Machine Learning’ (2022, edn.), pp.
[44] Garba, F.: ‘A Comprehensive Review of Routing for Low Power and
Lossy Network (RPL) Protocol Challenges and Proposed
Improvements’ (2022. 2022)
[45] Adebayo, A.O., Chaubey, M.S., and Numbu, L.P.: ‘Industry 4.0: The
fourth industrial revolution and how it relates to the application of
internet of things (IoT)’, Journal of Multidisciplinary Engineering
Science Studies (JMESS), 2019, 5, (2), pp. 2477-2482
[46] A. Almusaylim, Z., Jhanjhi, N.Z. & Alhumam, A. 2020. Detection and
Mitigation of RPL Rank and Version Number Attacks in the Internet
of Things: SRPL-RP. Sensors, 20(21), 10.3390/s20215997