全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Security Concerns with IoT Routing: A Review of Attacks, Countermeasures, and Future Prospects

DOI: 10.4236/ait.2024.144005, PP. 67-98

Keywords: IoT Routing Attacks, RPL Security, Resource Attacks, Topology Attacks, Traffic Attacks

Full-Text   Cite this paper   Add to My Lib

Abstract:

Today’s Internet of Things (IoT) application domains are widely distributed, which exposes them to several security risks and assaults, especially when data is being transferred between endpoints with constrained resources and the backbone network. Numerous researchers have put a lot of effort into addressing routing protocol security vulnerabilities, particularly regarding IoT RPL-based networks. Despite multiple studies on the security of IoT routing protocols, routing attacks remain a major focus of ongoing research in IoT contexts. This paper examines the different types of routing attacks, how they affect Internet of Things networks, and how to mitigate them. Then, it provides an overview of recently published work on routing threats, primarily focusing on countermeasures, highlighting noteworthy security contributions, and drawing conclusions. Consequently, it achieves the study’s main objectives by summarizing intriguing current research trends in IoT routing security, pointing out knowledge gaps in this field, and suggesting directions and recommendations for future research on IoT routing security.

References

[1]  Mrabet, H., Belguith, S., Alhomoud, A. and Jemai, A. (2020) A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Sensors, 20, Article 3625.
https://doi.org/10.3390/s20133625
[2]  Tournier, J., Lesueur, F., Mouël, F.L., Guyon, L. and Ben-Hassine, H. (2021) A Survey of IoT Protocols and Their Security Issues through the Lens of a Generic IoT Stack. Internet of Things, 16, Article 100264.
https://doi.org/10.1016/j.iot.2020.100264
[3]  Sahay, R., Geethakumari, G. and Mitra, B. (2021) A Holistic Framework for Prediction of Routing Attacks in IoT-LLNs. The Journal of Supercomputing, 78, 1409-1433.
https://doi.org/10.1007/s11227-021-03922-1
[4]  Boudouaia, M.A., Ali-Pacha, A., Abouaissa, A. and Lorenz, P. (2020) Security against Rank Attack in RPL Protocol. IEEE Network, 34, 133-139.
https://doi.org/10.1109/mnet.011.1900651
[5]  Verma, A. and Ranga, V. (2020) Security of RPL Based 6lowpan Networks in the Internet of Things: A Review. IEEE Sensors Journal, 20, 5666-5690.
https://doi.org/10.1109/jsen.2020.2973677
[6]  Vaghela, R. and Upadhyay, D. (2020) A Survey on Routing Attacks in Internet of Things (IOT). International Research Journal of Engineering and Technology, 7, 36-42.
[7]  Sengupta, J., Ruj, S. and Das Bit, S. (2020) A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT. Journal of Network and Computer Applications, 149, Article 102481.
https://doi.org/10.1016/j.jnca.2019.102481
[8]  Al-Amiedy, T.A., Anbar, M., Belaton, B., Kabla, A.H.H., Hasbullah, I.H. and Alashhab, Z.R. (2022) A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things. Sensors, 22, Article 3400.
https://doi.org/10.3390/s22093400
[9]  Avila, K., Jabba, D. and Gomez, J. (2020) Security Aspects for RPL-Based Protocols: A Systematic Review in IoT. Applied Sciences, 10, Article 6472.
https://doi.org/10.3390/app10186472
[10]  Bang, A.O., Rao, U.P., Kaliyar, P. and Conti, M. (2022) Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey. ACM Computing Surveys, 55, 1-36.
https://doi.org/10.1145/3494524
[11]  Stephen, A. and Arockiam, L. (2021) Attacks against RPL in IoT: A Survey. Annals of R.S.C.B., 25, 9767-9786.
[12]  Challa, R. and Rao, K.S. (2022) Resource Based Attacks Security Using RPL Protocol in Internet of Things. Ingénierie des systèmes d information, 27, 165-170.
https://doi.org/10.18280/isi.270120
[13]  Akhtar, M.S. and Feng, T. (2022) A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers. ICST Transactions on Security and Safety, 8, e5.
https://doi.org/10.4108/eetss.v8i30.590
[14]  Wang, X., Ma, X., Peng, J., Li, J., Xue, L., Hu, W., et al. (2021) On Modeling Link Flooding Attacks and Defenses. IEEE Access, 9, 159198-159217.
https://doi.org/10.1109/access.2021.3131503
[15]  Cakir, S., Toklu, S. and Yalcin, N. (2020) RPL Attack Detection and Prevention in the Internet of Things Networks Using a GRU Based Deep Learning. IEEE Access, 8, 183678-183689.
https://doi.org/10.1109/access.2020.3029191
[16]  Aditya Sai Srinivas, T. and Manivannan, S.S. (2020) Prevention of Hello Flood Attack in IoT Using Combination of Deep Learning with Improved Rider Optimization Algorithm. Computer Communications, 163, 162-175.
https://doi.org/10.1016/j.comcom.2020.03.031
[17]  Hkiri, A., Alqurashi, S., Ben Bahri, O., Karmani, M., Faraj, H. and Machhout, M. (2024) Performance Evaluation of Mobile RPL-Based IoT Networks under Hello Flood Attack. Electronics, 13, Article 2226.
https://doi.org/10.3390/electronics13112226
[18]  Abhinaya, E.V. and Sudhakar, B. (2021) A Secure Routing Protocol for Low Power and Lossy Networks Based 6LoWPAN Networks to Mitigate DIS Flooding Attacks. Journal of Ambient Intelligence and Humanized Computing, 12, 1-12.
https://doi.org/10.1007/s12652-020-02804-3
[19]  Medjek, F., Tandjaoui, D., Djedjig, N. and Romdhani, I. (2021) Multicast DIS Attack Mitigation in RPL-Based IoT-LLNs. Journal of Information Security and Applications, 61, Article 102939.
https://doi.org/10.1016/j.jisa.2021.102939
[20]  Verma, A. and Ranga, V. (2019) Mitigation of DIS Flooding Attacks in RPL-Based 6LoWPAN Networks. Transactions on Emerging Telecommunications Technologies, 31, e3802.
https://doi.org/10.1002/ett.3802
[21]  Çakir, S. and Yalçin, N. (2021) Detection of DIS Flooding Attacks in IoT Networks Using Machine Learning Methods. European Journal of Science and Technology, 28, 1317-1320.
https://doi.org/10.31590/ejosat.1014917
[22]  Rajasekar, V.R. and Rajkumar, S. (2022) A Study on Impact of DIS Flooding Attack on RPL-Based 6LoWPAN Network. Microprocessors and Microsystems, 94, Article 104675.
https://doi.org/10.1016/j.micpro.2022.104675
[23]  Osman, M., He, J., Mokbal, F.M.M., Zhu, N. and Qureshi, S. (2021) ML-LGBM: A Machine Learning Model Based on Light Gradient Boosting Machine for the Detection of Version Number Attacks in RPL-Based Networks. IEEE Access, 9, 83654-83665.
https://doi.org/10.1109/access.2021.3087175
[24]  Sahay, R., Geethakumari, G., Mitra, B. and Sahoo, I. (2019) Efficient Framework for Detection of Version Number Attack in Internet of Things. In: Abraham, A., Cherukuri, A.K., Melin, P. and Gandhi, N., Eds., Intelligent Systems Design and Applications, Springer, 480-492.
https://doi.org/10.1007/978-3-030-16660-1_47
[25]  Sharma, G., Grover, J. and Verma, A. (2023) Performance Evaluation of Mobile RPL-Based IoT Networks under Version Number Attack. Computer Communications, 197, 12-22.
https://doi.org/10.1016/j.comcom.2022.10.014
[26]  Sharma, G., Grover, J. and Verma, A. (2023) QSec-RPL: Detection of Version Number Attacks in RPL Based Mobile IoT Using Q-learning. Ad Hoc Networks, 142, Article 103118.
https://doi.org/10.1016/j.adhoc.2023.103118
[27]  Alfriehat, N.A., Anbar, M., Karuppayah, S., Rihan, S.D.A., Alabsi, B.A. and Momani, A.M. (2024) Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy. IEEE Access, 12, 31136-31158.
https://doi.org/10.1109/access.2024.3368633
[28]  Rahamathullah, U. and Karthikeyan, E. (2021) A Lightweight Trust-Based System to Ensure Security on the Internet of Battlefield Things (IoBT) Environment. International Journal of System Assurance Engineering and Management, 12, 1-13.
https://doi.org/10.1007/s13198-021-01250-4
[29]  Kannan, S., Reddy, G.F.H. and Rajesh, M. (2020) Novel Approach Using Optimized Trustable Route Node Convention Technique with Robust Security for Mobile Ad Hoc Networks in IoT. Oxidation Communications, 43, 39-53.
[30]  Zhang, Q. and Xu, D. (2018) Security Authentication Technology Based on Dynamic Bayesian Network in Internet of Things. Journal of Ambient Intelligence and Humanized Computing, 11, 573-580.
https://doi.org/10.1007/s12652-018-0949-2
[31]  Verma, A. and Ranga, V. (2020) The Impact of Copycat Attack on RPL Based 6LoWPAN Networks in Internet of Things. Computing, 103, 1479-1500.
https://doi.org/10.1007/s00607-020-00862-1
[32]  Alamiedy, T.A., Anbar, M.F.R., Belaton, B., Kabla, A.H. and Khudayer, B.H. (2021) Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks. In: Abdullah, N., Manickam, S. and Anbar, M., Eds., Advances in Cyber Security, Springer, 340-360.
https://doi.org/10.1007/978-981-16-8059-5_21
[33]  Al-Sadoon, M. and Jedidi, A. (2022) A Secure Trust-Based Protocol for Hierarchical Routing in Wireless Sensor Network. International Journal of Electrical and Computer Engineering, 12, 3838-3849.
https://doi.org/10.11591/ijece.v12i4.pp3838-3849
[34]  Karthikeyan, H. and Usha, G. (2022) Real-Time DDoS Flooding Attack Detection in Intelligent Transportation Systems. Computers and Electrical Engineering, 101, Article 107995.
https://doi.org/10.1016/j.compeleceng.2022.107995
[35]  Hasan, A.H., Anbar, M. and Alamiedy, T.A. (2022) Deep Learning Approach for Detecting Router Advertisement Flooding-Based DDoS Attacks. Journal of Ambient Intelligence and Humanized Computing, 14, 7281-7295.
https://doi.org/10.1007/s12652-022-04437-0
[36]  Rui, K., Pan, H. and Shu, S. (2023) Secure Routing in the Internet of Things (IoT) with Intrusion Detection Capability Based on Software-Defined Networking (SDN) and Machine Learning Techniques. Scientific Reports, 13, Article No. 18003.
https://doi.org/10.1038/s41598-023-44764-6
[37]  Fotohi, R. and Pakdel, H. (2021) A Lightweight and Scalable Physical Layer Attack Detection Mechanism for the Internet of Things (IoT) Using Hybrid Security Schema. Wireless Personal Communications, 119, 3089-3106.
https://doi.org/10.1007/s11277-021-08388-1
[38]  Chakraborty, M., Spanò, A. and Cortesi, A. (2021) Geographic Location Based Secure, Dynamic and Opportunistic RPL for Distributed Networks. Ad Hoc Networks, 123, Article 102689.
https://doi.org/10.1016/j.adhoc.2021.102689
[39]  Neerugatti, V. and Rama Mohan Reddy, A. (2020) Artificial Intelligence-Based Technique for Detection of Selective Forwarding Attack in RPL-Based Internet of Things Networks. In: Krishna, P.V. and Obaidat, M.S., Eds., Emerging Research in Data Engineering Systems and Computer Communications, Springer, 67-77.
https://doi.org/10.1007/978-981-15-0135-7_7
[40]  Jiang, J. and Liu, Y. (2022) Secure IoT Routing—Selective Forwarding Attacks and Trust-Based Defences in RPL Network.
[41]  Adarbah, H.Y. and Ahmad, S. (2022) Impact of Selective Forwarding Attacks on the Performance of RPL Routing Protocol in the Internet of Things. International Journal of Research Publication and Reviews, 3, 1479-1487.
[42]  Prathapchandran, K. and Janani, T. (2021) A Trust Aware Security Mechanism to Detect Sinkhole Attack in RPL-Based IoT Environment Using Random Forest—RFTRUST. Computer Networks, 198, Article 108413.
https://doi.org/10.1016/j.comnet.2021.108413
[43]  Zaminkar, M. and Fotohi, R. (2020) Sos-rpl: Securing Internet of Things against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism. Wireless Personal Communications, 114, 1287-1312.
https://doi.org/10.1007/s11277-020-07421-z
[44]  Tabari, M.Y. and Mataji, Z. (2021) Detecting Sinkhole Attack in RPL-Based Internet of Things Routing Protocol. Journal of Artificial Intelligence and Data Mining, 9, 73-85.
[45]  Omar, A.A.A., Soudan, B. and Altaweel, A. (2023) A Comprehensive Survey on Detection of Sinkhole Attack in Routing over Low Power and Lossy Network for Internet of Things. Internet of Things, 22, Article 100750.
https://doi.org/10.1016/j.iot.2023.100750
[46]  Mondal, K., Yadav, S.S., Pal, V., Singh, A.P., Yogita, Y. and Singh, M. (2022) Detecting Sinkhole Attacks in IoT-Based Wireless Sensor Networks Using Distance from Base Station. International Journal of Information System Modeling and Design, 13, 1-18.
https://doi.org/10.4018/ijismd.297628
[47]  Bilal, A., Hasany, S.M.N. and Pitafi, A.H. (2022) Effective Modelling of Sinkhole Detection Algorithm for Edge-Based Internet of Things (IoT) Sensing Devices. IET Communications, 16, 845-855.
https://doi.org/10.1049/cmu2.12385
[48]  An, G.H. and Cho, T.H. (2022) Improving Sinkhole Attack Detection Rate through Knowledge-Based Specification Rule for a Sinkhole Attack Intrusion Detection Technique of IoT. International Journal of Computer Networks and Applications, 9, 169-178.
https://doi.org/10.22247/ijcna/2022/212333
[49]  Parkavi, T. and Arockiam, L.  (2021) A Survey on Sinkhole Attack in RPL. Annals of the Romanian Society for Cell Biology, 25, 511-515.
http://annalsofrscb.ro/index.php/journal/article/view/4322
[50]  Pundir, S., Wazid, M., Singh, D.P., Das, A.K., J. P. C. Rodrigues, J.J.P.C. and Park, Y. (2020) Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment. Sensors, 20, Article 1300.
https://doi.org/10.3390/s20051300
[51]  Patel, B. and Shah, P. (2021) Direct Neighbour Sink Reputed Trust Based Intrusion Detection System to Mitigate Sinkhole Attack in RPL for IoT Networks. Journal of Engineering Science and Technology Review, 14, 38-35.
https://doi.org/10.25103/jestr.141.03
[52]  Patel, B.H. and Shah, P. (2020) RPL Routing Protocol Performance under Sinkhole and Selective Forwarding Attack: Experimental and Simulated Evaluation. Telecommunication Computing Electronics and Control, 18, 1849-1856.
https://doi.org/10.12928/telkomnika.v18i4.15768
[53]  Srinivas, T.A.S. and Manivannan, S.S. (2021) Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid Meta-Heuristic-Based Shortest Path Routing. Journal of Ambient Intelligence and Smart Environments, 13, 133-156.
https://doi.org/10.3233/ais-210591
[54]  Alansari, Z., Anuar, N.B., Kamsin, A. and Belgaum, M.R. (2023) RPLAD3: Anomaly Detection of Blackhole, Grayhole, and Selective Forwarding Attacks in Wireless Sensor Network-Based Internet of Things. Peer J Computer Science, 9, e1309.
https://doi.org/10.7717/peerj-cs.1309
[55]  Bhosale, S.A. and Sonavane, S.S. (2021) Wormhole Attack Detection System for IoT Network: A Hybrid Approach. Wireless Personal Communications, 124, 1081-1108.
https://doi.org/10.1007/s11277-021-09395-y
[56]  Parvathy, K. (2021) Wormhole Attacks in Wireless Sensor Networks (WSN) & Internet of Things (IoT): A Review. International Journal of Recent Technology and Engineering, 10, 199-203.
https://doi.org/10.35940/ijrte.a5873.0510121
[57]  Shahid, H., Ashraf, H., Javed, H., Humayun, M., Jhanjhi, N. and A. AlZain, M. (2021) Energy Optimized Security against Wormhole Attack in IoT-Based Wireless Sensor Networks. Computers, Materials & Continua, 68, 1967-1981.
https://doi.org/10.32604/cmc.2021.015259
[58]  Sahraneshin, T., Malekhosseini, R., Rad, F. and Yaghoubyan, S.H. (2022) Securing Communications between Things against Wormhole Attacks Using TOPSIS Decision-Making and Hash-Based Cryptography Techniques in the IoT Ecosystem. Wireless Networks, 29, 969-983.
https://doi.org/10.1007/s11276-022-03169-5
[59]  Priyadarshini, R., Alagirisamy, M., Rajendran, N. and Varunkumar, K.A. (2022) Invalidation of Tunnelling Attacks in Ubiquitous IoT & Wireless Sensor Enviroment Using ML Methods. Optik, 271, Article 170163.
https://doi.org/10.1016/j.ijleo.2022.170163
[60]  Javed, S., Sajid, A., Kiren, T., Khan, I.U., Dewi, C., Cauteruccio, F., et al. (2023) A Subjective Logical Framework-Based Trust Model for Wormhole Attack Detection and Mitigation in Low-Power and Lossy (RPL) IoT-Networks. Information, 14, Article 478.
https://doi.org/10.3390/info14090478
[61]  VenkataRao, S. and Ananth, V. (2021) A Hybrid Optimization Algorithm and Shamir Secret Sharing Based Secure Data Transmission for IoT based WSN. International Journal of Intelligent Engineering and Systems, 14, 498-506
[62]  Sharma, D.K., Dhurandher, S.K., Kumaram, S., Gupta, K.D. and Sharma, P.K. (2022) Mitigation of Black Hole Attacks in 6LoWPAN RPL-Based Wireless Sensor Network for Cyber Physical Systems. Computer Communications, 189, 182-192.
[63]  Kandhoul, N. and Dhurandher, S.K. (2021) An Efficient and Secure Data Forwarding Mechanism for Opportunistic IoT. Wireless Personal Communications, 118, 217-237.
https://doi.org/10.1007/s11277-020-08010-w
[64]  Malik, A., Khan, M.Z., Faisal, M., Khan, F. and Seo, J. (2022) An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in Vanets. Sensors, 22, Article 1897.
https://doi.org/10.3390/s22051897
[65]  Srinivasan, V. (2021) Detection of Black Hole Attack Using Honeypot Agent-Based Scheme with Deep Learning Technique on Manet. Ingénierie des systèmes d information, 26, 549-557.
https://doi.org/10.18280/isi.260605
[66]  Rutravigneshwaran, P., Anitha, G. and Prathapchandran, K. (2022) Trust-Based Support Vector Regressive (TSVR) Security Mechanism to Identify Malicious Nodes in the Internet of Battlefield Things (IoBT). International Journal of System Assurance Engineering and Management, 15, 287-299.
https://doi.org/10.1007/s13198-022-01719-w
[67]  ul Hassan, T., Asim, M., Baker, T., Hassan, J. and Tariq, N. (2021) CTrust-RPL: A Control Layer-Based Trust Mechanism for Supporting Secure Routing in Routing Protocol for Low Power and Lossy Networks-Based Internet of Things Applications. Transactions on Emerging Telecommunications Technologies, 32, e4224.
https://doi.org/10.1002/ett.4224
[68]  Kale, S. and Bhosale, S. (2021) Detection of Blackhole Attack in IoT. IT in Industry, 9, 1-8.
[69]  Srinivas, T.A.S. and Manivannan, S.S.M. (2020) Preventing Collaborative Black Hole Attack in IoT Construction Using a CBHA–AODV Routing Protocol. International Journal of Grid and High Performance Computing, 12, 25-46.
https://doi.org/10.4018/ijghpc.2020040102
[70]  Luangoudom, S., Tran, D., Nguyen, T., Tran, H.A., Nguyen, G. and Ha, Q.T. (2020) Svblock: Mitigating Black Hole Attack in Low-Power and Lossy Networks. International Journal of Sensor Networks, 32, 77-86.
https://doi.org/10.1504/ijsnet.2020.104923
[71]  Hasan, A., Khan, M.A., Shabir, B., Munir, A., Malik, A.W., Anwar, Z., et al. (2022) Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things. Applied Sciences, 12, Article 11442.
https://doi.org/10.3390/app122211442
[72]  Safdar Malik, T., Siddiqui, M.N., Mateen, M., Malik, K.R., Sun, S. and Wen, J. (2022) Comparison of Blackhole and Wormhole Attacks in Cloud MANET Enabled IoT for Agricultural Field Monitoring. Security and Communication Networks, 2022, 1-18.
https://doi.org/10.1155/2022/4943218
[73]  Kiran, V., Rani, S. and Singh, P. (2019) Towards a Light Weight Routing Security in IoT Using Non-Cooperative Game Models and Dempster–Shaffer Theory. Wireless Personal Communications, 110, 1729-1749.
https://doi.org/10.1007/s11277-019-06809-w
[74]  Osman, M., He, J., Mokbal, F.M. and Zhu, N. (2021) Artificial Neural Network Model for Decreased Rank Attack Detection in RPL Based on IoT Networks. International Journal of Network Security, 23, 497-504.
[75]  Rouissat, M., Belkehir, M., Mokaddem, A., Bouziani, M. and Alsukayti, I.S. (2024) Exploring and Mitigating Hybrid Rank Attack in RPL-Based IoT Networks. Journal of Electrical Engineering, 75, 204-213.
https://doi.org/10.2478/jee-2024-0025
[76]  Bang, A.O. and Rao, U.P. (2021) A Novel Decentralized Security Architecture against Sybil Attack in RPL-Based IoT Networks: A Focus on Smart Home Use Case. The Journal of Supercomputing, 77, 13703-13738.
https://doi.org/10.1007/s11227-021-03816-2
[77]  Murali, S. and Jamalipour, A. (2020) A Lightweight Intrusion Detection for Sybil Attack under Mobile RPL in the Internet of Things. IEEE Internet of Things Journal, 7, 379-388.
https://doi.org/10.1109/jiot.2019.2948149
[78]  Pu, C. (2020) Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses. IEEE Internet of Things Journal, 7, 4937-4949.
https://doi.org/10.1109/jiot.2020.2971463
[79]  Hassan, J., Sohail, A., Awad, A.I. and Zaka, M.A. (2024) LETM-IoT: A Lightweight and Efficient Trust Mechanism for Sybil Attacks in Internet of Things Networks. Ad Hoc Networks, 163, Article 103576.
https://doi.org/10.1016/j.adhoc.2024.103576
[80]  Arshad, A., Mohd Hanapi, Z., Subramaniam, S. and Latip, R. (2021) A Survey of Sybil Attack Countermeasures in IoT-Based Wireless Sensor Networks. Peer J Computer Science, 7, e673.
https://doi.org/10.7717/peerj-cs.673
[81]  Thuluva, A.S.S., Somanathan, M.S., Somula, R., Sennan, S. and Burgos, D. (2021) Secure and Efficient Transmission of Data Based on Caesar Cipher Algorithm for Sybil Attack in IoT. EURASIP Journal on Advances in Signal Processing, 2021, Article No. 38.
https://doi.org/10.1186/s13634-021-00748-0
[82]  Mehbodniya, A., Webber, J.L., Shabaz, M., Mohafez, H. and Yadav, K. (2021) RETRACTED ARTICLE: Machine Learning Technique to Detect Sybil Attack on IoT Based Sensor Network. IETE Journal of Research, 69, 1-9.
https://doi.org/10.1080/03772063.2021.2000509
[83]  Arshad, D., Asim, M., Tariq, N., Baker, T., Tawfik, H. and Al-Jumeily OBE, D. (2022) THC-RPL: A Lightweight Trust-Enabled Routing in RPL-Based IoT Networks against Sybil Attack. PLOS ONE, 17, e0271277.
https://doi.org/10.1371/journal.pone.0271277
[84]  Morales-Molina, C.D., Hernandez-Suarez, A., Sanchez-Perez, G., Toscano-Medina, L.K., Perez-Meana, H., Olivares-Mercado, J., et al. (2021) A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT. Sensors, 21, Article 3173.
https://doi.org/10.3390/s21093173
[85]  Vaishnavi, S. and Sethukarasi, T. (2022) Detection and Avoidance of Clone Attack in IoT Based Smart Health Application. Intelligent Automation & Soft Computing, 31, 1919-1937.
https://doi.org/10.32604/iasc.2022.021006
[86]  Kore, A. and Patil, S. (2022) Cross Layered Cryptography Based Secure Routing for IoT-Enabled Smart Healthcare System. Wireless Networks, 28, 287-301.
https://doi.org/10.1007/s11276-021-02850-5
[87]  G, I.L. and Kavitha, V. (2021) Privacy Preserving Using Multi-Hop Dynamic Clustering Routing Protocol and Elliptic Curve Cryptosystem for WSN in IoT Environment. Peer-to-Peer Networking and Applications, 14, 821-836.
https://doi.org/10.1007/s12083-020-01038-6
[88]  Meena, U. and Sharma, P. (2022) Secret Dynamic Key Authentication and Decision Trust Secure Routing Framework for Internet of Things Based WSN. Wireless Personal Communications, 125, 1753-1781.
https://doi.org/10.1007/s11277-022-09632-y
[89]  Conti, M., Kaliyar, P., Rabbani, M.M. and Ranise, S. (2020) Attestation-Enabled Secure and Scalable Routing Protocol for IoT Networks. Ad Hoc Networks, 98, Article 102054.
https://doi.org/10.1016/j.adhoc.2019.102054
[90]  Alotaibi, M. (2021) Improved Blowfish Algorithm-Based Secure Routing Technique in IoT-Based WSN. IEEE Access, 9, 159187-159197.
https://doi.org/10.1109/access.2021.3130005
[91]  Simoglou, G., Violettas, G., Petridou, S. and Mamatas, L. (2021) Intrusion Detection Systems for RPL Security: A Comparative Analysis. Computers & Security, 104, Article 102219.
https://doi.org/10.1016/j.cose.2021.102219
[92]  Pasikhani, A.M., Clark, J.A., Gope, P. and Alshahrani, A. (2021) Intrusion Detection Systems in RPL-Based 6lowpan: A Systematic Literature Review. IEEE Sensors Journal, 21, 12940-12968.
https://doi.org/10.1109/jsen.2021.3068240
[93]  Sahay, R., Geethakumari, G. and Mitra, B. (2022) Mitigating the Worst Parent Attack in RPL Based Internet of Things. Cluster Computing, 25, 1303-1320.
https://doi.org/10.1007/s10586-021-03528-5
[94]  Wadhaj, I., Ghaleb, B., Thomson, C., Al-Dubai, A. and Buchanan, W.J. (2020) Mitigation Mechanisms against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL). IEEE Access, 8, 43665-43675.
https://doi.org/10.1109/access.2020.2977476
[95]  Anajemba, J.H., Tang, Y., Iwendi, C., Ohwoekevwo, A., Srivastava, G. and Jo, O. (2020) Realizing Efficient Security and Privacy in IoT Networks. Sensors, 20, Article 2609.
https://doi.org/10.3390/s20092609
[96]  Bang, A.O. and Rao, U.P. (2022) EMBOF-RPL: Improved RPL for Early Detection and Isolation of Rank Attack in RPL-Based Internet of Things. Peer-to-Peer Networking and Applications, 15, 642-665.
https://doi.org/10.1007/s12083-021-01275-3
[97]  Seyfollahi, A., Moodi, M. and Ghaffari, A. (2022) MFO-RPL: A Secure RPL-Based Routing Protocol Utilizing Moth-Flame Optimizer for the IoT Applications. Computer Standards & Interfaces, 82, Article 103622.
https://doi.org/10.1016/j.csi.2022.103622
[98]  Nandhini, P.S., Kuppuswami, S., Malliga, S. and DeviPriya, R. (2022) Enhanced Rank Attack Detection Algorithm (E-RAD) for Securing RPL-Based IoT Networks by Early Detection and Isolation of Rank Attackers. The Journal of Supercomputing, 79, 6825-6848.
https://doi.org/10.1007/s11227-022-04921-6
[99]  Nandhini, P.S., Kuppuswami, S., Malliga, S. and DeviPriya, R. (2022) A Lightweight Energy-Efficient Algorithm for Mitigation and Isolation of Internal Rank Attackers in RPL Based Internet of Things. Computer Networks, 218, Article 109391.
https://doi.org/10.1016/j.comnet.2022.109391
[100]  Deebak, B.D. and Al-Turjman, F. (2020) A Hybrid Secure Routing and Monitoring Mechanism in IoT-Based Wireless Sensor Networks. Ad Hoc Networks, 97, Article 102022.
https://doi.org/10.1016/j.adhoc.2019.102022
[101]  Gali, S. and Nidumolu, V. (2021) An Intelligent Trust Sensing Scheme with Metaheuristic Based Secure Routing Protocol for Internet of Things. Cluster Computing, 25, 1779-1789.
https://doi.org/10.1007/s10586-021-03473-3
[102]  Guo, X., Lin, H., Li, Z. and Peng, M. (2020) Deep-Reinforcement-Learning-Based QoS-Aware Secure Routing for SDN-IoT. IEEE Internet of Things Journal, 7, 6242-6251.
https://doi.org/10.1109/jiot.2019.2960033
[103]  Farea, A.H. and Küçük, K. (2022) Detections of IoT Attacks via Machine Learning-Based Approaches with Cooja. EAI Endorsed Transactions on Internet of Things, 7, 1-12.
https://doi.org/10.4108/eetiot.v7i28.324
[104]  Verma, A. and Ranga, V. (2020) Cosec-RPL: Detection of Copycat Attacks in RPL Based 6LoWPANs Using Outlier Analysis. Telecommunication Systems, 75, 43-61.
https://doi.org/10.1007/s11235-020-00674-w
[105]  Stute, M., Agarwal, P., Kumar, A., Asadi, A. and Hollick, M. (2020) LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems. IEEE Internet of Things Journal, 7, 6802-6816.
https://doi.org/10.1109/jiot.2020.2985044
[106]  Muzammal, S.M., Murugesan, R.K., Jhanjhi, N., Hossain, M.S. and Yassine, A. (2022) Trust and Mobility-Based Protocol for Secure Routing in Internet of Things. Sensors, 22, Article 6215.
https://doi.org/10.3390/s22166215
[107]  Muzammal, S.M., Murugesan, R.K., Jhanjhi, N.Z., Humayun, M., Ibrahim, A.O. and Abdelmaboud, A. (2022) A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things. Sensors, 22, Article 7052.
https://doi.org/10.3390/s22187052
[108]  Kaliyar, P., Jaballah, W.B., Conti, M. and Lal, C. (2020) LIDL: Localization with Early Detection of Sybil and Wormhole Attacks in IoT Networks. Computers & Security, 94, Article 101849.
https://doi.org/10.1016/j.cose.2020.101849
[109]  Sahay, R., Geethakumari, G. and Mitra, B. (2020) A Novel Blockchain Based Framework to Secure IoT-LLNs against Routing Attacks. Computing, 102, 2445-2470.
https://doi.org/10.1007/s00607-020-00823-8
[110]  Sharma, S. and Verma, V.K. (2021) AIEMLA: Artificial Intelligence Enabled Machine Learning Approach for Routing Attacks on Internet of Things. The Journal of Supercomputing, 77, 13757-13787.
https://doi.org/10.1007/s11227-021-03833-1
[111]  Gothawal, D.B. and Nagaraj, S.V. (2019) Anomaly-Based Intrusion Detection System in RPL by Applying Stochastic and Evolutionary Game Models over IoT Environment. Wireless Personal Communications, 110, 1323-1344.
https://doi.org/10.1007/s11277-019-06789-x
[112]  Kalyani, G. and Chaudhari, S. (2021) Cross Layer Security MAC Aware Routing Protocol for IoT Networks. Wireless Personal Communications, 123, 935-957.
https://doi.org/10.1007/s11277-021-09163-y
[113]  A. Almusaylim, Z., Jhanjhi, N. and Alhumam, A. (2020) Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP. Sensors, 20, Article 5997.
https://doi.org/10.3390/s20215997
[114]  Raoof, A., Matrawy, A. and Lung, C. (2020) Enhancing Routing Security in IoT: Performance Evaluation of RPL’s Secure Mode under Attacks. IEEE Internet of Things Journal, 7, 11536-11546.
https://doi.org/10.1109/jiot.2020.3022276
[115]  Bettoumi, B. and Bouallegue, R. (2021) LC-DEX: Lightweight and Efficient Compressed Authentication Based Elliptic Curve Cryptography in Multi-Hop 6LoWPAN Wireless Sensor Networks in Hip-Based Internet of Things. Sensors, 21, Article 7348.
https://doi.org/10.3390/s21217348
[116]  Almusaylim, Z.A., Alhumam, A. and Jhanjhi, N.Z. (2020) Proposing a Secure RPL Based Internet of Things Routing Protocol: A Review. Ad Hoc Networks, 101, Article 102096.
https://doi.org/10.1016/j.adhoc.2020.102096
[117]  Kalyani, G. and Chaudhari, S. (2021) Security Aware Routing: Rule Based Attack Detection on Optimal Shortest Route Selection. Ad Hoc & Sensor Wireless Networks, 49, 223-245.
[118]  Sharma, S. and Verma, V.K. (2020) Security Explorations for Routing Attacks in Low Power Networks on Internet of Things. The Journal of Supercomputing, 77, 4778-4812.
https://doi.org/10.1007/s11227-020-03471-z
[119]  Djedjig, N., Tandjaoui, D., Medjek, F. and Romdhani, I. (2020) Trust-Aware and Cooperative Routing Protocol for IoT Security. Journal of Information Security and Applications, 52, Article 102467.
https://doi.org/10.1016/j.jisa.2020.102467
[120]  Ilyas, M., Ullah, Z., Khan, F.A., Chaudary, M.H., Malik, M.S.A., Zaheer, Z., et al. (2020) Trust-Based Energy-Efficient Routing Protocol for Internet of Things-Based Sensor Networks. International Journal of Distributed Sensor Networks, 16, Article 155014772096435.
https://doi.org/10.1177/1550147720964358
[121]  Albishari, M., Li, M., Zhang, R. and Almosharea, E. (2022) Deep Learning-Based Early Stage Detection (DL-ESD) for Routing Attacks in Internet of Things Networks. The Journal of Supercomputing, 79, 2626-2653.
https://doi.org/10.1007/s11227-022-04753-4
[122]  Mujtaba, A., Amjad, S., Rafiq, A., Mubarik, A. and Younus, M.U. (2022) Enhancement of accuracy of the Rank Inconsistency Detection Algorithm. Pakistan Journal of Engineering and Applied Sciences, 30, 61-75.
[123]  Zahra, F., Jhanjhi, N., Brohi, S.N., Khan, N.A., Masud, M. and AlZain, M.A. (2022) Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning. Sensors, 22, Article 6765.
https://doi.org/10.3390/s22186765
[124]  Kandhoul, N. and Dhurandher, S.K. (2022) Deep Q Learning Based Secure Routing Approach for OppIoT Networks. Internet of Things, 20, Article 100597.
https://doi.org/10.1016/j.iot.2022.100597
[125]  Remya, S., Pillai, M.J., Arjun, C., Ramasubbareddy, S. and Cho, Y. (2024) Enhancing Security in LLNs Using a Hybrid Trust-Based Intrusion Detection System for RPL. IEEE Access, 12, 58836-58850.
https://doi.org/10.1109/access.2024.3391918
[126]  Qureshi, K.N., Rana, S.S., Ahmed, A. and Jeon, G. (2020) A Novel and Secure Attacks Detection Framework for Smart Cities Industrial Internet of Things. Sustainable Cities and Society, 61, Article 102343.
https://doi.org/10.1016/j.scs.2020.102343
[127]  Ioulianou, P.P., Vassilakis, V.G. and Shahandashti, S.F. (2022) A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks. Journal of Cybersecurity and Privacy, 2, 124-153.
https://doi.org/10.3390/jcp2010009
[128]  Foley, J., Moradpoor, N. and Ochenyi, H. (2020) Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset. Security and Communication Networks, 2020, 1-17.
https://doi.org/10.1155/2020/2804291
[129]  Medjek, F., Tandjaoui, D., Djedjig, N. and Romdhani, I. (2021) Fault-Tolerant Ai-Driven Intrusion Detection System for the Internet of Things. International Journal of Critical Infrastructure Protection, 34, Article 100436.
https://doi.org/10.1016/j.ijcip.2021.100436
[130]  Hashemi, S.Y. and Shams Aliee, F. (2020) Fuzzy, Dynamic and Trust Based Routing Protocol for IoT. Journal of Network and Systems Management, 28, 1248-1278.
https://doi.org/10.1007/s10922-020-09535-y
[131]  Farooq, U., Asim, M., Tariq, N., Baker, T. and Awad, A.I. (2022) Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security. Sensors, 22, Article 4539.
https://doi.org/10.3390/s22124539
[132]  Sahraoui, S. and Henni, N. (2021) SAMP-RPL: Secure and Adaptive Multipath RPL for Enhanced Security and Reliability in Heterogeneous IoT-Connected Low Power and Lossy Networks. Journal of Ambient Intelligence and Humanized Computing, 14, 409-429.
https://doi.org/10.1007/s12652-021-03303-9
[133]  Bokka, R. and Sadasivam, D.T. (2021) Machine Learning Techniques to Detect Routing Attacks in RPL Based Internet of Things. International Journal of Electrical Engineering and Technology, 12, 346-356.
[134]  Sithik, M.M. and Kumar, B.M. (2022) Intelligent Agent Based Virtual Clustering and Multi-Context Aware Routing for Congestion Mitigation in Secure RPL-IoT Environment. Ad Hoc Networks, 137, Article 102972.
https://doi.org/10.1016/j.adhoc.2022.102972
[135]  Garcia Ribera, E., Martinez Alvarez, B., Samuel, C., Ioulianou, P.P. and Vassilakis, V.G. (2022) An Intrusion Detection System for RPL-Based IoT Networks. Electronics, 11, Article 4041.
https://doi.org/10.3390/electronics11234041
[136]  Belavagi, M.C. and Muniyal, B. (2020) Multiple Intrusion Detection in RPL Based Networks. International Journal of Electrical and Computer Engineering, 10, 467-476.
https://doi.org/10.11591/ijece.v10i1.pp467-476
[137]  Raghavendra, T., Anand, M., Selvi, M., Thangaramya, K., Santhosh Kumar, S. and Kannan, A. (2022) An Intelligent RPL Attack Detection Using Machine Learning-Based Intrusion Detection System for Internet of Things. Procedia Computer Science, 215, 61-70.
https://doi.org/10.1016/j.procs.2022.12.007
[138]  Alsukayti, I.S. and Alreshoodi, M. (2023) RPL-Based IoT Networks under Simple and Complex Routing Security Attacks: An Experimental Study. Applied Sciences, 13, Article 4878.
https://doi.org/10.3390/app13084878
[139]  Al Sawafi, Y., Touzene, A. and Hedjam, R. (2023) Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks. Journal of Sensor and Actuator Networks, 12, Article 21.
https://doi.org/10.3390/jsan12020021
[140]  Alazab, A., Khraisat, A., Singh, S., Bevinakoppa, S. and Mahdi, O.A. (2023) Routing Attacks Detection in 6LoWPAN-Based Internet of Things. Electronics, 12, Article 1320.
https://doi.org/10.3390/electronics12061320
[141]  Hussain, M.Z. and Hanapi, Z.M. (2023) Efficient Secure Routing Mechanisms for the Low-Powered IoT Network: A Literature Review. Electronics, 12, Article 482.
https://doi.org/10.3390/electronics12030482
[142]  Hosseinzadeh, M., Yoo, J., Ali, S., Lansky, J., Mildeova, S., Yousefpoor, M.S., et al. (2023) A Fuzzy Logic-Based Secure Hierarchical Routing Scheme Using Firefly Algorithm in Internet of Things for Healthcare. Scientific Reports, 13, Article No. 11058.
https://doi.org/10.1038/s41598-023-38203-9
[143]  Jahangeer, A., Bazai, S.U., Aslam, S., Marjan, S., Anas, M. and Hashemi, S.H. (2023) A Review on the Security of IoT Networks: From Network Layer’s Perspective. IEEE Access, 11, 71073-71087.
https://doi.org/10.1109/access.2023.3246180
[144]  Shanmugapriya, R. and SVN, S.K. (2024) An Energy Efficient Swan Intelligent Based Clustering Technique (SICT) with Fuzzy Based Secure Routing Protocol in IoT. Peer-to-Peer Networking and Applications, 17, 1830-1864.
https://doi.org/10.1007/s12083-024-01670-6
[145]  Ahmadi, K. and Javidan, R. (2024) A Novel RPL Defense Mechanism Based on Trust and Deep Learning for Internet of Things. The Journal of Supercomputing, 80, 16979-17003.
https://doi.org/10.1007/s11227-024-06118-5
[146]  Chandnani, N. and Khairnar, C.N. (2023) A Reliable Protocol for Data Aggregation and Optimized Routing in IoT WSNs Based on Machine Learning. Wireless Personal Communications, 130, 2589-2622.
https://doi.org/10.1007/s11277-023-10393-5
[147]  Rao, A.K., Nagwanshi, K.K. and Shukla, M.K. (2024) An Optimized Secure Cluster-Based Routing Protocol for IoT-Based WSN Structures in Smart Agriculture with Blockchain-Based Integrity Checking. Peer-to-Peer Networking and Applications, 17, 2609-2636.
https://doi.org/10.1007/s12083-024-01748-1
[148]  Brickclay (2023) Future of AI and Machine Learning: Trends and Predictions.
https://www.brickclay.com/blog/machine-learning/future-of-ai-and-machine-learning-trends-and-predictions/
[149]  Dilmegani, C. (2024) Future of Deep Learning According to Top AI Experts of 2023. AI Multiple.
https://research.aimultiple.com/future-of-deep-learning/

Full-Text

Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133