Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review
Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. Ho...
Gespeichert in:
Veröffentlicht in: | IEEE sensors journal 2020-06, Vol.20 (11), p.5666-5690 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 5690 |
---|---|
container_issue | 11 |
container_start_page | 5666 |
container_title | IEEE sensors journal |
container_volume | 20 |
creator | Verma, Abhishek Ranga, Virender |
description | Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. However, global connectivity and resource constrained characteristics of smart devices have exposed them to different insider and outsider attacks, which put users' security and privacy at risk. Various risks associated with IoT slow down its growth and become an obstruction in the worldwide adoption of its applications. In RFC 6550, the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) is specified by IETF's ROLL working group for facilitating efficient routing in 6LoWPAN networks, while considering its limitations. Due to resource constrained nature of nodes in the IoT, RPL is vulnerable to many attacks that consume the node's resources and degrade the network's performance. In this paper, we present a study on various attacks and their existing defense solutions, particularly to RPL. Open research issues, challenges, and future directions specific to RPL security are also discussed. A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding. In addition, a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is also carried out. |
doi_str_mv | 10.1109/JSEN.2020.2973677 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_8998289</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8998289</ieee_id><sourcerecordid>2400102626</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-2b619ba4ab16f53854cc9461b25d5cffef705471c529093dd494296359fd0ba33</originalsourceid><addsrcrecordid>eNqNkE1P3DAQhqOKSnyUH4C4WOoRZRl_xXZv2xXlQ6tlBVTtLUqcMRhoDLa3q_33JFpUrj3Ne3ieGc1bFEcUJpSCOb26PVtMGDCYMKN4pdSnYo9KqUuqhN4ZM4dScPV7t9hP6RGAGiXVXnF1i3YVfd6Q4MjNck6-Nwk7Us3Dr-V0QRaY1yE-JeJ7kh-QXPYZY495pO8efH-fvpEpucG_Htdfis-ueU54-D4Pip8_zu5mF-X8-vxyNp2XlhmeS9ZW1LSNaFpaOcm1FNYaUdGWyU5a59ApkEJRK5kBw7tOGMFMxaVxHbQN5wfF1-3elxheV5hy_RhWsR9O1kwMjwGrWDVQdEvZGFKK6OqX6P80cVNTqMfK6rGyeqysfq9scE62zhrb4JL12Fv85wGA5IJp0EMCNtD6_-mZz032oZ-FVZ8H9XiresQPRRujmTb8DV0chY0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2400102626</pqid></control><display><type>article</type><title>Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review</title><source>IEEE Electronic Library (IEL)</source><creator>Verma, Abhishek ; Ranga, Virender</creator><creatorcontrib>Verma, Abhishek ; Ranga, Virender</creatorcontrib><description>Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. However, global connectivity and resource constrained characteristics of smart devices have exposed them to different insider and outsider attacks, which put users' security and privacy at risk. Various risks associated with IoT slow down its growth and become an obstruction in the worldwide adoption of its applications. In RFC 6550, the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) is specified by IETF's ROLL working group for facilitating efficient routing in 6LoWPAN networks, while considering its limitations. Due to resource constrained nature of nodes in the IoT, RPL is vulnerable to many attacks that consume the node's resources and degrade the network's performance. In this paper, we present a study on various attacks and their existing defense solutions, particularly to RPL. Open research issues, challenges, and future directions specific to RPL security are also discussed. A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding. In addition, a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is also carried out.</description><identifier>ISSN: 1530-437X</identifier><identifier>EISSN: 1558-1748</identifier><identifier>DOI: 10.1109/JSEN.2020.2973677</identifier><identifier>CODEN: ISJEAZ</identifier><language>eng</language><publisher>PISCATAWAY: IEEE</publisher><subject>6LoWPAN ; Electronic devices ; Embedded systems ; Engineering ; Engineering, Electrical & Electronic ; Instruments & Instrumentation ; Internet of Things ; IP (Internet Protocol) ; LLN ; network security ; Physical Sciences ; Physics ; Physics, Applied ; Routing ; Routing protocols ; RPL ; Science & Technology ; Security ; Sensors ; Taxonomy ; Technology ; Topology ; Wireless sensor networks</subject><ispartof>IEEE sensors journal, 2020-06, Vol.20 (11), p.5666-5690</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>true</woscitedreferencessubscribed><woscitedreferencescount>97</woscitedreferencescount><woscitedreferencesoriginalsourcerecordid>wos000534280800002</woscitedreferencesoriginalsourcerecordid><citedby>FETCH-LOGICAL-c293t-2b619ba4ab16f53854cc9461b25d5cffef705471c529093dd494296359fd0ba33</citedby><cites>FETCH-LOGICAL-c293t-2b619ba4ab16f53854cc9461b25d5cffef705471c529093dd494296359fd0ba33</cites><orcidid>0000-0002-2046-8642 ; 0000-0001-6687-4809</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8998289$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>315,781,785,797,27929,27930,28253,54763</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8998289$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Verma, Abhishek</creatorcontrib><creatorcontrib>Ranga, Virender</creatorcontrib><title>Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review</title><title>IEEE sensors journal</title><addtitle>JSEN</addtitle><addtitle>IEEE SENS J</addtitle><description>Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. However, global connectivity and resource constrained characteristics of smart devices have exposed them to different insider and outsider attacks, which put users' security and privacy at risk. Various risks associated with IoT slow down its growth and become an obstruction in the worldwide adoption of its applications. In RFC 6550, the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) is specified by IETF's ROLL working group for facilitating efficient routing in 6LoWPAN networks, while considering its limitations. Due to resource constrained nature of nodes in the IoT, RPL is vulnerable to many attacks that consume the node's resources and degrade the network's performance. In this paper, we present a study on various attacks and their existing defense solutions, particularly to RPL. Open research issues, challenges, and future directions specific to RPL security are also discussed. A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding. In addition, a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is also carried out.</description><subject>6LoWPAN</subject><subject>Electronic devices</subject><subject>Embedded systems</subject><subject>Engineering</subject><subject>Engineering, Electrical & Electronic</subject><subject>Instruments & Instrumentation</subject><subject>Internet of Things</subject><subject>IP (Internet Protocol)</subject><subject>LLN</subject><subject>network security</subject><subject>Physical Sciences</subject><subject>Physics</subject><subject>Physics, Applied</subject><subject>Routing</subject><subject>Routing protocols</subject><subject>RPL</subject><subject>Science & Technology</subject><subject>Security</subject><subject>Sensors</subject><subject>Taxonomy</subject><subject>Technology</subject><subject>Topology</subject><subject>Wireless sensor networks</subject><issn>1530-437X</issn><issn>1558-1748</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>AOWDO</sourceid><recordid>eNqNkE1P3DAQhqOKSnyUH4C4WOoRZRl_xXZv2xXlQ6tlBVTtLUqcMRhoDLa3q_33JFpUrj3Ne3ieGc1bFEcUJpSCOb26PVtMGDCYMKN4pdSnYo9KqUuqhN4ZM4dScPV7t9hP6RGAGiXVXnF1i3YVfd6Q4MjNck6-Nwk7Us3Dr-V0QRaY1yE-JeJ7kh-QXPYZY495pO8efH-fvpEpucG_Htdfis-ueU54-D4Pip8_zu5mF-X8-vxyNp2XlhmeS9ZW1LSNaFpaOcm1FNYaUdGWyU5a59ApkEJRK5kBw7tOGMFMxaVxHbQN5wfF1-3elxheV5hy_RhWsR9O1kwMjwGrWDVQdEvZGFKK6OqX6P80cVNTqMfK6rGyeqysfq9scE62zhrb4JL12Fv85wGA5IJp0EMCNtD6_-mZz032oZ-FVZ8H9XiresQPRRujmTb8DV0chY0</recordid><startdate>20200601</startdate><enddate>20200601</enddate><creator>Verma, Abhishek</creator><creator>Ranga, Virender</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AOWDO</scope><scope>BLEPL</scope><scope>DTL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7U5</scope><scope>8FD</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0002-2046-8642</orcidid><orcidid>https://orcid.org/0000-0001-6687-4809</orcidid></search><sort><creationdate>20200601</creationdate><title>Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review</title><author>Verma, Abhishek ; Ranga, Virender</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-2b619ba4ab16f53854cc9461b25d5cffef705471c529093dd494296359fd0ba33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>6LoWPAN</topic><topic>Electronic devices</topic><topic>Embedded systems</topic><topic>Engineering</topic><topic>Engineering, Electrical & Electronic</topic><topic>Instruments & Instrumentation</topic><topic>Internet of Things</topic><topic>IP (Internet Protocol)</topic><topic>LLN</topic><topic>network security</topic><topic>Physical Sciences</topic><topic>Physics</topic><topic>Physics, Applied</topic><topic>Routing</topic><topic>Routing protocols</topic><topic>RPL</topic><topic>Science & Technology</topic><topic>Security</topic><topic>Sensors</topic><topic>Taxonomy</topic><topic>Technology</topic><topic>Topology</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Verma, Abhishek</creatorcontrib><creatorcontrib>Ranga, Virender</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Web of Science - Science Citation Index Expanded - 2020</collection><collection>Web of Science Core Collection</collection><collection>Science Citation Index Expanded</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE sensors journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Verma, Abhishek</au><au>Ranga, Virender</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review</atitle><jtitle>IEEE sensors journal</jtitle><stitle>JSEN</stitle><stitle>IEEE SENS J</stitle><date>2020-06-01</date><risdate>2020</risdate><volume>20</volume><issue>11</issue><spage>5666</spage><epage>5690</epage><pages>5666-5690</pages><issn>1530-437X</issn><eissn>1558-1748</eissn><coden>ISJEAZ</coden><abstract>Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. However, global connectivity and resource constrained characteristics of smart devices have exposed them to different insider and outsider attacks, which put users' security and privacy at risk. Various risks associated with IoT slow down its growth and become an obstruction in the worldwide adoption of its applications. In RFC 6550, the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) is specified by IETF's ROLL working group for facilitating efficient routing in 6LoWPAN networks, while considering its limitations. Due to resource constrained nature of nodes in the IoT, RPL is vulnerable to many attacks that consume the node's resources and degrade the network's performance. In this paper, we present a study on various attacks and their existing defense solutions, particularly to RPL. Open research issues, challenges, and future directions specific to RPL security are also discussed. A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding. In addition, a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is also carried out.</abstract><cop>PISCATAWAY</cop><pub>IEEE</pub><doi>10.1109/JSEN.2020.2973677</doi><tpages>25</tpages><orcidid>https://orcid.org/0000-0002-2046-8642</orcidid><orcidid>https://orcid.org/0000-0001-6687-4809</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1530-437X |
ispartof | IEEE sensors journal, 2020-06, Vol.20 (11), p.5666-5690 |
issn | 1530-437X 1558-1748 |
language | eng |
recordid | cdi_ieee_primary_8998289 |
source | IEEE Electronic Library (IEL) |
subjects | 6LoWPAN Electronic devices Embedded systems Engineering Engineering, Electrical & Electronic Instruments & Instrumentation Internet of Things IP (Internet Protocol) LLN network security Physical Sciences Physics Physics, Applied Routing Routing protocols RPL Science & Technology Security Sensors Taxonomy Technology Topology Wireless sensor networks |
title | Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-15T02%3A05%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20of%20RPL%20Based%206LoWPAN%20Networks%20in%20the%20Internet%20of%20Things:%20A%20Review&rft.jtitle=IEEE%20sensors%20journal&rft.au=Verma,%20Abhishek&rft.date=2020-06-01&rft.volume=20&rft.issue=11&rft.spage=5666&rft.epage=5690&rft.pages=5666-5690&rft.issn=1530-437X&rft.eissn=1558-1748&rft.coden=ISJEAZ&rft_id=info:doi/10.1109/JSEN.2020.2973677&rft_dat=%3Cproquest_RIE%3E2400102626%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2400102626&rft_id=info:pmid/&rft_ieee_id=8998289&rfr_iscdi=true |