An Overview of RPL Networks from the Viewpoint of Cybersecurity
Downloads
In the past decade, the Internet of Things (IoT) has had a significant impact on a global scale. The Internet of Things (IoT) has facilitated the interconnection of a vast number of devices in contemporary times. The proliferation of Internet of Things (IoT) devices underscores the importance of ensuring robust security measures to safeguard against potential threats. The RPL protocol has been specifically designed for routing purposes within the context of IoT devices, operating at the network layer. The exploitation of the RPL protocol poses a threat to IoT networks and has the potential to substantially affect network performance. This article introduces the STACK project, which aims to improve IoT transmission capabilities, identify and mitigate attacks using performance and interference monitoring, and use methods tightly integrated with an intelligent edge.
Downloads
George Simoglou, George Violettas, Sophia Petridou, Lefteris Mamatas, Intrusion detection systems for RPL security: A comparative analysis, Computers & Security, Volume 104, 2021,102219, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2021.102219.
Olfa Gaddour, Anis Koubâa, Mohamed Abid,Quality-of-service aware routing for static and mobile IPv6-based low-power and lossy sensor networks using RPL, Ad Hoc Networks, Volume 33, 2015, Pages 233-256, ISSN 1570-8705, https://doi.org/10.1016/j.adhoc.2015.05.009.
Qasem M, Al-Dubai A, Romdhani I, Ghaleb B, Gharibi W, “A new efficient objective function for routing in internet of things paradigm”, in Standards for Communications and Networking (CSCN), 2016 IEEE Conference on 2016 Oct 31 (pp. 1-6). IEEE.
S. Y. Hashemi and F. Shams Aliee, “Dynamic and comprehensive trust model for IoT and its integration into RPL,” J. Supercomput., vol. 75, no. 7, pp. 3555–3584, 2019.
A. E. Hassani, A. Sahel, A. Badri, and E. M. Ilham, “A hybrid objective function with empirical stability aware to improve RPL for IoT applications,” Int. J. Electr. Comput. Eng., vol. 11, no. 3, pp. 2350– 2359, 2021.
Z. A. Almusaylim, N. Z. Jhanjhi, and A. Alhumam, “Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP,” Sensors (Switzerland), vol. 20, no. 21, pp. 1–25, 2020.
A. Jahangeer, S. U. Bazai, S. Aslam, S. Marjan, M. Anas and S. H. Hashemi, "A Review on the Security of IoT Networks: From Network Layer’s Perspective," in IEEE Access, doi: 10.1109/ACCESS.2023.3246180.
W. Fang, W. Zhang, W. Chen, T. Pan, Y. Ni, and Y. Yang, “TrustBased Attack and Defense in Wireless Sensor Networks: A Survey,” Wirel. Commun. Mob. Comput., vol. 2020, 2020.
S. R. Taghanaki, S. B. Arzandeh, and A. Bohlooli, “A Decentralized Method for Detecting Clone ID Attacks on the Internet of Things,” Proc. 2021 5th Int. Conf. Internet Things Appl. IoT 2021, 2021.
Q. Zhang and W. Zhang, “Accurate detection of selective forwarding attack in wireless sensor networks,” Int. J. Distrib. Sens. Networks, vol. 15, no. 1, 2019.
Muneer Bani Yassein, I. Hmeidi, Y. Khamayseh, M. Al-Rousan, and D. Arrabi, “Black Hole Attack Security Issues, Challenges & Solution in Manet,” no. April 2019, pp. 199–207, 2018.
Gulzar, C.M., Kurnool, & Kashyap, R. (2015). Prevention of Black Hole Attack in MANET.
O. R. Ahutu and H. El-Ocla, “Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks,” IEEE Access, vol. 8, pp. 63270–63282, 2020.
https://www.tutorialspoint.com/internet_of_things/internet_of_things_contiki.htm accessed at March 20th, 2023.
Derogarian, Fardin. (2015). Design of a Body Sensor Network Embedded in Textiles for Biomedical Applications. 10.13140/RG.2.1.1192.3920.
https://phdinfo.org/contiki%20cooja%20wsn%20simulator.html accessed at April 3rd, 2023.
File STACK%20Project%20profile%20leaflet.pdf accessed at April 23rd, 2023.
https://agile.ro/stack/about/ accessed at April 23rd, 2023.