A Survey on Trust-based Intrusion Detection for Version Number Attack on RPL
DOI:
https://doi.org/10.26438/ijcse/v6i10.449454Keywords:
IoT, RPL, security, attacks, Trust-based, intrusion detationAbstract
The IoT incorporates the network of physical devices (things) that are connected to the global Internet for transferring and performing computation in lager application area. Routing protocols are designed for Low Power and Lossy network (RPL) to support communication in the constrained network with thousands of such power-scarce nodes in IoT. Consequently, due to the increases in millions and billions of connected devices in the constraint network(s) all over the world, security has become the aspect of most significance. Lightweight Intrusion Detection System (IDS) is required to examine the malicious activity and malicious node in the network of IoT, to filter out different attacks in a resource-constrained environment. In this paper, the lightweight trust based intrusion detection methods covering the different attacks of the wireless sensor network and IoT are reviewed and discussed. This article may give the direction to the beginners to identify appropriate methods and observations for their future research in the application domain of IoT.
References
[1] H.D. Ma., “Internet of things: Objectives and scientific challenges”, Journal of Computer science and Technology, Vol. 26(6), pp.919–924, 2011.
[2] L. Patra, U.P. Rao, “Internet of Things - Architecture, applications, security and other major challenges”, 2016 3rd International Conference on Computing for Sustainable Global Development, New Delhi, pp. 1201-1206, 2016.
[3] T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik, J. Vasseur, and R. Alexander, “RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks”, RFC 6550, Internet Engineering Task Force, 2012.
[4] L. Wallgren, S. Raza, T. Voigt, “Routing Attacks and Countermeasures in the RPL-based Internet of Things” International Journal of Distributed Sensor Networks, Vol. 9(8), p. 794326, 2013.
[5] B.A. Alabsi, M. Anbar, S. anickam, “A Comprehensive Review on Security Attacks in Dynamic Wireless Sensor Networks based on RPL protocol”, International Journal of Pure and Applied Mathematics, Vol.118, pp. 653-667, 2018.
[6] D. Shreenivas, S. Raza, T. Voigt, “Intrusion Detection in the RPL-connected 6LoWPAN Networks”, ACM International Workshop on IoT Privacy, Trust and Security, pp. 31 – 38, 2017.
[7] D. Airehrour, “A Trust-based Routing Framework for the Internet of Things”, PhD Diss, Auckland University of Technology, 2017.
[8] H.S. Kim, J. Ko, D.E. Culler, J. Paek, “Challenging the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL): A Survey”, IEEE Communications Suveys and Tutorials, Vol. 19, No. 4, pp. 2502 –2525, 2017.
[9] M. Kaur, A. Mohd Aslam, “Big Data Analytics on IOT: Challenges, Open Research Issues and Tools”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.81-85, 2018.
[10] C. Bekara, “Security Issues and Challenges for the IoT-based Smart Grid”, International Workshop on Communicating Objects and Machine to Machine for Mission Critical Application, Elsevier, pp. 532 – 537, 2014.
[11] P. Manickam, V. Muthu Ganeshan, M. Girija, “Comprehensive Approach in Studying the Behaviour of Contiki RPL Protocol in Diverse Data Transmission Ranges”, International Journal of Scientific Research in Network Security and Communication, Vol. 6, Issue. 3, pp. 37-42, 2018.
[12] A. Mayzaud , R. Badonnel, I. Chrismen, “A Taxonomy of Attacks in RPL-based Internet of Things”, International Journal of Network Security, Vol.18, No. 3, pp. 459 – 473, 2016.
[13] R. Mehta, M.M. Parmar, “A Survey on Security Attacks and Countermeasures in RPL for Internet of Things”, International Journal of Advance Research in Science and Engineering, Vol. 7, No. 3, 2018.
[14] A. Mayzaud, R. Badonnel, I. Chrisment, “A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks”, IEEE Transactions on Network and Service Management, Vol. 14, No. 2, pp. 472-486, 2017.
[15] A. Dvir, T. Holczer, L. Buttyan, “VeRA - Version Number and Rank Authentication in RPL”, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, Valencia, pp. 709-714, 2011.
[16] F. Ahmed, Y.B. Ko, “A Distributed and Cooperative Verification Mechanism to Defend against DODAGVersion Number Attack in RPL”, International joint conference on Pervasive and Embedded Computing and Communication systems, Vol. 1, pp. 55–62, 2016.
[17] M. Nikravan, A. Moaghar, M. Hosseinzadeh, “A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy Networks”, Wireless Personal Communications, Springer, pp. 1 –25, 2018.
[18] C.R. Perez-Toro, R.K. Panta, S. Bagchi, “RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network”, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Boston, MA, pp. 1-9, 2010.
[19] N. Djedjig, D. Tandjaoui, F. Medjek, “Trust-based rpl for the Internet of things”, in 2015 IEEE Symposium on Computers and Communication (ISCC). IEEE, pp. 962–967, 2015.
[20] N. Djedjig, D. Tandjaoui, F. Medjek, I. Romdhani, “New trust metric for the rpl routing protocol”, in 2017 IEEE The 8th International Conference on Information and Communication Systems (ICICS). IEEE, 2017.
[21] Z.A. Khan, P. Herrmann, “A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things”, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), Taipei, pp. 1169-1176, 2017.
[22] F. Nygaard , “Intrusion Detection System In IoT”, Master`s thesis, NTNU, 2017.
[23] D. Airehrour, J. Gutierrez, S.K. Ray, “A Trust-Aware RPL Routing Protocol to Detect Blackhole and Selective Forwarding Attacks”, Australian Journal of Telecommunications and the Digital Economy, vol. 5, April 2017.
[24] F. Medjek, D. Tandjaoui, I. Romdhani, N. Djedjig, “A Trust-Based Intrusion Detection System for Mobile RPL Based Networks”, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, pp. 735-742, 2017.
[25] J. Caminha, A. Perkusich, M. Perkusich, “A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things”, Security and Communication Networks, pp.10, 2018.
[26] A. Mayzaud, R. Badonnel, I. Chrisment, “Monitoring and Security for the RPL-based Internet of Things”, Doctoral dissertation, University de Lorraine, 2016.
[27] A. Aris, S. F. Oktug, S. Berna Ors Yalcin, “RPL version number attacks: In-depth study”, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, Istanbul, pp. 776-779, 2016.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
