A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things
Keywords:
Defense technique, RPL, Routing attacks, IoTAbstract
The proliferation of the Internet of Things (IoT) has attracted different sectors such as agriculture, manufacturing, smart cities, transportation, etc. to adopt these technologies. Most IoT networks utilize Routing Protocol for Low Power and Lossy Networks (RPL) to exchange control and data packets across the network. However, RPL is susceptible to routing attacks such as rank attacks, DIS-flooding, etc. In recent years different defense techniques have been proposed to act against these attacks i.e., Secure-Protocol, conventional Intrusion Detection Systems (IDS), and Machine Learning (ML)-based. This systematic literature review explores 39 published papers in the domain of defense techniques against routing attacks in RPL-based IoT. We review. The findings of this study suggest that most Secure-Protocol can detect and mitigate routing attacks utilizing distributed placement, ML-based can detect most attacks but lack mitigation mechanisms, and conventional IDS technique utilizes a hybrid approach in detection and placement strategies. Additionally, this study reveals that India publishes more research papers in ML-based and Secure-Protocol. Furthermore, flooding attacks are the most discussed attacks in the selected studies. Finally, Cooja Contiki is the most used simulation tool.
Downloads
Published
Issue
Section
License
Copyright Notice
Authors who publish this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-Non-Commercial-Share-Alike 4.0 International 4.0 that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Disclaimer
LAJC in no event shall be liable for any direct, indirect, incidental, punitive, or consequential copyright infringement claims related to articles that have been submitted for evaluation, or published in any issue of this journal. Find out more in our Disclaimer Notice.