A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things

Keywords: Defense technique, RPL, Routing attacks, IoT

Abstract

The proliferation of the Internet of Things (IoT) has attracted different sectors such as agriculture, manufacturing, smart cities, transportation, etc. to adopt these technologies. Most IoT networks utilize Routing Protocol for Low Power and Lossy Networks (RPL) to exchange control and data packets across the network. However, RPL is susceptible to routing attacks such as rank attacks, DIS-flooding, etc. In recent years different defense techniques have been proposed to act against these attacks i.e., Secure-Protocol, conventional Intrusion Detection Systems (IDS), and Machine Learning (ML)-based. This systematic literature review explores 39 published papers in the domain of defense techniques against routing attacks in RPL-based IoT. We review. The findings of this study suggest that most Secure-Protocol can detect and mitigate routing attacks utilizing distributed placement, ML-based can detect most attacks but lack mitigation mechanisms, and conventional IDS technique utilizes a hybrid approach in detection and placement strategies. Additionally, this study reveals that India publishes more research papers in ML-based and Secure-Protocol. Furthermore, flooding attacks are the most discussed attacks in the selected studies. Finally, Cooja Contiki is the most used simulation tool.

Downloads

Download data is not yet available.

References

Ankam, S., and Reddy, D.N.S.: ‘A mechanism to detecting flooding attacks in quantum enabled cloud-based lowpower and lossy networks’, Theoretical Computer Science, 2023, 941, pp. 29-38

Medjek, F., Tandjaoui, D., Djedjig, N., and Romdhani, I.: ‘Multicast DIS attack mitigation in RPL-based IoT-LLNs’, Journal of Information Security and Applications, 2021, 61, pp. 102939

Bang, A.O., and Rao, U.P.: ‘A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case’, The Journal of Supercomputing, 2021, 77, (12), pp. 13703-13738

Goel, S., Verma, A., and Jain, V.K.: ‘CRA-RPL: A Novel Lightweight challenge-Response authentication-based technique for securing RPL against dropped DAO attacks’, Computers & Security, 2023, 132, pp. 103346

Seyfollahi, A., Moodi, M., and Ghaffari, A.: ‘MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications’, Computer Standards & Interfaces, 2022, 82, pp. 103622

6 Seth, A.D., Biswas, S., and Dhar, A.K.: ‘Mitigation Technique against Network Isolation Attack on RPL in 6LoWPAN Network’, in Editor (Ed.)^(Eds.): ‘Book Mitigation Technique against Network Isolation Attack on RPL in 6LoWPAN Network’ (2021, edn.), pp. 68-73

Violettas, G., Simoglou, G., Petridou, S., and Mamatas, L.: ‘A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks’, Future Generation Computer Systems, 2021, 125, pp. 698-714

Ahmad, R., and Alsmadi, I.: ‘Machine learning approaches to IoT security: A systematic literature review ’, Internet of Things, 2021, 14, pp. 100365

Al-Amiedy, T.A., Anbar, M., Belaton, B., Bahashwan, A.A., Hasbullah, I.H., Aladaileh, M.A., and Mukhaini, G.A.L.: ‘A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things’, Internet of Things, 2023, 22, pp. 100741

Pasikhani, A.M., Clark, J.A., Gope, P., and Alshahrani, A.: ‘Intrusion Detection Systems in RPL-Based 6LoWPAN: A Systematic Literature Review’, IEEE Sensors Journal, 2021, 21, (11), pp. 12940-12968

Verma, A., and Ranga, V.: ‘Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review’, IEEE Sensors Journal, 2020, 20, (11), pp. 5666-5690

L, A.R., S, B., and G. S, C.: ‘An Effective Detection of Version Number Attacks in the IoT using Neural Networks’, in Editor (Ed.)^(Eds.): ‘Book An Effective Detection of Version Number Attacks in the IoT using Neural Networks’ (2022, edn.), pp. 1-7

Ioulianou, P.P., Vassilakis, V.G., and Shahandashti, S.F.: ‘ML-based Detection of Rank and Blackhole Attacks in RPL Networks’, in Editor (Ed.)^(Eds.): ‘Book ML-based Detection of Rank and Blackhole Attacks in RPL Networks’ (2022, edn.), pp. 338-343

Ioulianou, P.P., Vassilakis, V.G., and Shahandashti, S.F.: ‘A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks’, in Editor (Ed.)^(Eds.): ‘Book A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks’ (2022, edn.), pp. 124-153

Ioannou, C., and Vassiliou, V.: ‘Accurate Detection of Sinkhole Attacks in IoT Networks Using Local Agents’, in Editor (Ed.)^(Eds.): ‘Book Accurate Detection of Sinkhole Attacks in IoT Networks Using Local Agents’ (2020, edn.), pp. 1-8

Moreira, C.M., and Kaddoum, G.: ‘QL vs. SARSA: Performance Evaluation for Intrusion Prevention Systems in Software-Defined IoT Networks’, in Editor (Ed.)^(Eds.): ‘Book QL vs. SARSA: Performance Evaluation for Intrusion Prevention Systems in Software-Defined IoT Networks’ (2023, edn.), pp. 500-504

Qureshi, K.N., Rana, S.S., Ahmed, A., and Jeon, G.: ‘A novel and secure attacks detection framework for smart cities industrial internet of things’, Sustainable Cities and Society, 2020, 61, pp. 102343

Raoof, A., Lung, C.H., and Matrawy, A.: ‘Securing RPL Using Network Coding: The Chained Secure Mode (CSM)’, IEEE Internet of Things Journal, 2022, 9, (7), pp. 4888-4898

Pu, C., and Hajjar, S.: ‘Mitigating Forwarding misbehaviors in RPL-based low power and lossy networks’, in Editor (Ed.)^(Eds.): ‘Book Mitigating Forwarding misbehaviors in RPL-based low power and lossy networks’ (2018, edn.), pp. 1-6

Chen, B., Li, Y., and Mashima, D.: ‘Analysis and enhancement of RPL under packet drop attacks’, in Editor (Ed.)^(Eds.): ‘Book Analysis and enhancement of RPL under packet drop attacks’ (2018, edn.), pp. 167-174

Wadhaj, I., Ghaleb, B., Thomson, C., Al-Dubai, A., and Buchanan, W.J.: ‘Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL)’, IEEE Access, 2020, 8, pp. 43665-43675

Alsukayti, I.S., and Singh, A.: ‘A Lightweight Scheme for Mitigating RPL Version Number Attacks in IoT Networks’, IEEE Access, 2022, 10, pp. 111115-111133

Rouissat, M., Belkheir, M., Alsukayti, I.S., and Mokaddem, A.: ‘A Lightweight Mitigation Approach against a New Inundation Attack in RPL-Based IoT Networks’, in Editor (Ed.)^(Eds.): ‘Book A Lightweight Mitigation Approach against a New Inundation Attack in RPL-Based IoT Networks’ (2023, edn.), pp.

A. Almusaylim, Z., Jhanjhi, N.Z., and Alhumam, A.: ‘Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP’, in Editor (Ed.)^(Eds.): ‘Book Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP’ (2020, edn.), pp.

Deshmukh-Bhosale, S., and Sonavane, S.S.: ‘A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things’, Procedia Manufacturing, 2019, 32, pp. 840-847

Manne, V.R.J., and Sreekanth, S.: ‘Detection and Mitigation of RPL Routing Attacks in Internet of Things’, in Editor (Ed.)^(Eds.): ‘Book Detection and Mitigation of RPL Routing Attacks in Internet of Things’ (2022, edn.), pp. 481-485

Agiollo, A., Conti, M., Kaliyar, P., Lin, T.N., and Pajola, L.: ‘DETONAR: Detection of Routing Attacks in RPL-Based IoT’, IEEE Transactions on Network and Service Management, 2021, 18, (2), pp. 1178-1190

Choudhary, S., and Kesswani, N.: ‘Detection and Prevention of Routing Attacks in Internet of Things’, in Editor (Ed.)^(Eds.): ‘Book Detection and Prevention of Routing Attacks in Internet of Things’ (2018, edn.), pp. 1537-1540

Garcia Ribera, E., Martinez Alvarez, B., Samuel, C., Ioulianou, P.P., and Vassilakis, V.G.: ‘An Intrusion Detection System for RPL-Based IoT Networks’, in Editor (Ed.)^(Eds.): ‘Book An Intrusion Detection System for RPL-Based IoT Networks’ (2022, edn.), pp.

Yılmaz, S., Aydogan, E., and Sen, S.: ‘A Transfer Learning Approach for Securing Resource-Constrained IoT Devices’, IEEE Transactions on Information Forensics and Security, 2021, 16, pp. 4405-4418

Momand, M.D., Mohsin, M.K., and Ihsanulhaq: ‘Machine Learning-based Multiple Attack Detection in RPL over IoT’, in Editor (Ed.)^(Eds.): ‘Book Machine Learning-based Multiple Attack Detection in RPL over IoT’ (2021, edn.), pp. 1-8

Kamaldeep, Malik, M., Dutta, M., and Granjal, J.: ‘IoT-Sentry: A Cross-Layer-Based Intrusion Detection System in Standardized Internet of Things’, IEEE Sensors Journal, 2021, 21, (24), pp. 28066-28076

33 Pasikhan, A.M., Clark, J.A., and Gope, P.: ‘Incremental hybrid intrusion detection for 6LoWPAN’, Computers & Security, 2023, 135, pp. 103447

Raghavendra, T., Anand, M., Selvi, M., Thangaramya, K., Santhosh Kumar, S.V.N., and Kannan, A.: ‘An Intelligent RPL attack detection using Machine Learning-Based Intrusion Detection System for Internet of Things’, Procedia Computer Science, 2022, 215, pp. 61-70

Rabhi, S., Abbes, T., and Zarai, F.: ‘IoT Routing Attacks Detection Using Machine Learning Algorithms’, Wireless Personal Communications, 2023, 128, (3), pp. 1839-1857

Choukri, W., Lamaazi, H., and Benamar, N.: ‘RPL rank attack detection using Deep Learning’, in Editor (Ed.)^(Eds.): ‘Book RPL rank attack detection using Deep Learning’ (2020, edn.), pp. 1-6

Verma, A., and Ranga, V.: ‘ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things’, in Editor (Ed.)^(Eds.): ‘Book ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things’ (2019, edn.), pp. 1-6

Pasikhani, A.M., Clark, J.A., and Gope, P.: ‘Reinforcement-Learning-based IDS for 6LoWPAN’, in Editor (Ed.)^(Eds.): ‘Book Reinforcement-Learning-based IDS for 6LoWPAN’ (2021, edn.), pp. 1049-1060

Cakir, S., Toklu, S., and Yalcin, N.: ‘RPL Attack Detection and Prevention in the Internet of Things Networks Using a GRU Based Deep Learning’, IEEE Access, 2020, 8, pp. 183678-183689

Al Sawafi, Y., Touzene, A., and Hedjam, R.: ‘Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks’, in Editor (Ed.)^(Eds.): ‘Book Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks’ (2023, edn.), pp.

Zahra, F., Jhanjhi, N.Z., Brohi, S.N., Khan, N.A., Masud, M., and AlZain, M.A.: ‘Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning’, in Editor (Ed.)^(Eds.): ‘Book Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning’ (2022, edn.), pp.

Alazab, A., Khraisat, A., Singh, S., Bevinakoppa, S., and Mahdi, O.A.: ‘Routing Attacks Detection in 6LoWPAN-Based Internet of Things’, in Editor (Ed.)^(Eds.): ‘Book Routing Attacks Detection in 6LoWPAN-Based Internet of Things’ (2023, edn.), pp.

Zahra, F., Jhanjhi, N.Z., Khan, N.A., Brohi, S.N., Masud, M., and Aljahdali, S.: ‘Protocol-Specific and Sensor Network-Inherited Attack Detection in IoT Using Machine Learning’, in Editor (Ed.)^(Eds.): ‘Book Protocol-Specific and Sensor Network-Inherited Attack Detection in IoT Using Machine Learning’ (2022, edn.), pp.

Garba, F.: ‘A Comprehensive Review of Routing for Low Power and Lossy Network (RPL) Protocol Challenges and Proposed Improvements’ (2022. 2022)

Adebayo, A.O., Chaubey, M.S., and Numbu, L.P.: ‘Industry 4.0: The fourth industrial revolution and how it relates to the application of internet of things (IoT)’, Journal of Multidisciplinary Engineering Science Studies (JMESS), 2019, 5, (2), pp. 2477-2482

A. Almusaylim, Z., Jhanjhi, N.Z. & Alhumam, A. 2020. Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP. Sensors, 20(21), 10.3390/s20215997

Published
2025-01-07
How to Cite
[1]
L. Sejaphala, V. Malele, and F. Lugayizi, “A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things”, LAJC, vol. 12, no. 1, pp. 35-49, Jan. 2025.
Section
Research Articles for the Regular Issue