A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things
2023; Elsevier BV; Volume: 22; Linguagem: Inglês
10.1016/j.iot.2023.100741
ISSN2543-1536
AutoresTaief Alaa Al-Amiedy, Mohammed Anbar, Bahari Belaton, Abdullah Ahmed Bahashwan, Iznan H. Hasbullah, Mohammad Adnan Aladaileh, Ghada AL Mukhaini,
Tópico(s)Smart Grid Security and Resilience
ResumoThe Internet of Things (IoT) is one of the most rapidly evolving networking concepts, offering various applications for human benefit. Advances in embedded system architecture and compressed IPv6 have enabled IP stack functionality in resource-constrained heterogeneous smart devices. The IETF Routing Over Low power and Lossy network (ROLL) Working Group (WG) devised IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) to enable the communication between network nodes in IPv6 over Low-power Wireless Personal Area Network (6LoWPAN). The limited resources and heterogeneity of 6LoWPAN nodes make it challenging to design a security solution for Low Power and Lossy Networks, making them vulnerable to various security threats and attacks. Numerous security mechanisms based on trust, threshold, secure routing, authentication, and encryption have shown promising results in detecting anomalous activities in RPL-based 6LoWPAN. As a result, this study systematically examines and critically analyses the existing research domain on RPL security mechanisms. This research presents a comprehensive analysis of demographic characteristics, existing and new attacks, simulation programmes, network configuration, and evaluation measures in RPL-based 6LoWPAN. In addition, it proposes a thorough discussion of current issues, research challenges, and suggestions for future research avenues. This study reveals that most of the studies are published in IEEE Xplore® database and mainly comprises journal articles. Furthermore, the trust-based mechanism is the most used security mechanism for securing RPL-based 6LoWPAN. Finally, the Version Number, BlackHole, and Sybil attacks are the most discussed attacks in the selected studies.
Referência(s)