Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy

Nadia A. Alfriehat,Mohammed Anbar,Shankar Karuppayah,Shaza Dawood Ahmed Rihan,Basim Ahmad Alabsi,Alaa M. Momani
DOI: https://doi.org/10.1109/access.2024.3368633
IF: 3.9
2024-03-06
IEEE Access
Abstract:The internet of things (IoT) is an emerging technological advancement with significant implications. It connects a wireless sensor or node network via low-power and lossy networks (LLN). The routing protocol over a low-power and lossy network (RPL) is the fundamental component of LLN. Its lightweight design effectively addresses the limitations imposed by bandwidth, energy, and memory on both LLNs and IoT devices. Notwithstanding its efficacy, RPL introduces susceptibilities, including the version number attack (VNA), which underscores the need for IoT systems to implement effective security protocols. This work reviews and categorizes the security mechanisms proposed in the literature to detect VNA against RPL-based IoT networks. The existing mechanisms are thoroughly discussed and analyzed regarding their performance, datasets, implementation details, and limitations. Furthermore, a qualitative comparison is presented to benchmark this work against existing studies, showcasing its uniqueness. Finally, this work analyzes research gaps and proposes future research avenues.
computer science, information systems,telecommunications,engineering, electrical & electronic
What problem does this paper attempt to address?