Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review

Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. Ho...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE sensors journal 2020-06, Vol.20 (11), p.5666-5690
Hauptverfasser: Verma, Abhishek, Ranga, Virender
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 5690
container_issue 11
container_start_page 5666
container_title IEEE sensors journal
container_volume 20
creator Verma, Abhishek
Ranga, Virender
description Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. However, global connectivity and resource constrained characteristics of smart devices have exposed them to different insider and outsider attacks, which put users' security and privacy at risk. Various risks associated with IoT slow down its growth and become an obstruction in the worldwide adoption of its applications. In RFC 6550, the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) is specified by IETF's ROLL working group for facilitating efficient routing in 6LoWPAN networks, while considering its limitations. Due to resource constrained nature of nodes in the IoT, RPL is vulnerable to many attacks that consume the node's resources and degrade the network's performance. In this paper, we present a study on various attacks and their existing defense solutions, particularly to RPL. Open research issues, challenges, and future directions specific to RPL security are also discussed. A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding. In addition, a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is also carried out.
doi_str_mv 10.1109/JSEN.2020.2973677
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_8998289</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8998289</ieee_id><sourcerecordid>2400102626</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-2b619ba4ab16f53854cc9461b25d5cffef705471c529093dd494296359fd0ba33</originalsourceid><addsrcrecordid>eNqNkE1P3DAQhqOKSnyUH4C4WOoRZRl_xXZv2xXlQ6tlBVTtLUqcMRhoDLa3q_33JFpUrj3Ne3ieGc1bFEcUJpSCOb26PVtMGDCYMKN4pdSnYo9KqUuqhN4ZM4dScPV7t9hP6RGAGiXVXnF1i3YVfd6Q4MjNck6-Nwk7Us3Dr-V0QRaY1yE-JeJ7kh-QXPYZY495pO8efH-fvpEpucG_Htdfis-ueU54-D4Pip8_zu5mF-X8-vxyNp2XlhmeS9ZW1LSNaFpaOcm1FNYaUdGWyU5a59ApkEJRK5kBw7tOGMFMxaVxHbQN5wfF1-3elxheV5hy_RhWsR9O1kwMjwGrWDVQdEvZGFKK6OqX6P80cVNTqMfK6rGyeqysfq9scE62zhrb4JL12Fv85wGA5IJp0EMCNtD6_-mZz032oZ-FVZ8H9XiresQPRRujmTb8DV0chY0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2400102626</pqid></control><display><type>article</type><title>Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review</title><source>IEEE Electronic Library (IEL)</source><creator>Verma, Abhishek ; Ranga, Virender</creator><creatorcontrib>Verma, Abhishek ; Ranga, Virender</creatorcontrib><description>Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. However, global connectivity and resource constrained characteristics of smart devices have exposed them to different insider and outsider attacks, which put users' security and privacy at risk. Various risks associated with IoT slow down its growth and become an obstruction in the worldwide adoption of its applications. In RFC 6550, the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) is specified by IETF's ROLL working group for facilitating efficient routing in 6LoWPAN networks, while considering its limitations. Due to resource constrained nature of nodes in the IoT, RPL is vulnerable to many attacks that consume the node's resources and degrade the network's performance. In this paper, we present a study on various attacks and their existing defense solutions, particularly to RPL. Open research issues, challenges, and future directions specific to RPL security are also discussed. A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding. In addition, a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is also carried out.</description><identifier>ISSN: 1530-437X</identifier><identifier>EISSN: 1558-1748</identifier><identifier>DOI: 10.1109/JSEN.2020.2973677</identifier><identifier>CODEN: ISJEAZ</identifier><language>eng</language><publisher>PISCATAWAY: IEEE</publisher><subject>6LoWPAN ; Electronic devices ; Embedded systems ; Engineering ; Engineering, Electrical &amp; Electronic ; Instruments &amp; Instrumentation ; Internet of Things ; IP (Internet Protocol) ; LLN ; network security ; Physical Sciences ; Physics ; Physics, Applied ; Routing ; Routing protocols ; RPL ; Science &amp; Technology ; Security ; Sensors ; Taxonomy ; Technology ; Topology ; Wireless sensor networks</subject><ispartof>IEEE sensors journal, 2020-06, Vol.20 (11), p.5666-5690</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>true</woscitedreferencessubscribed><woscitedreferencescount>97</woscitedreferencescount><woscitedreferencesoriginalsourcerecordid>wos000534280800002</woscitedreferencesoriginalsourcerecordid><citedby>FETCH-LOGICAL-c293t-2b619ba4ab16f53854cc9461b25d5cffef705471c529093dd494296359fd0ba33</citedby><cites>FETCH-LOGICAL-c293t-2b619ba4ab16f53854cc9461b25d5cffef705471c529093dd494296359fd0ba33</cites><orcidid>0000-0002-2046-8642 ; 0000-0001-6687-4809</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8998289$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>315,781,785,797,27929,27930,28253,54763</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8998289$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Verma, Abhishek</creatorcontrib><creatorcontrib>Ranga, Virender</creatorcontrib><title>Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review</title><title>IEEE sensors journal</title><addtitle>JSEN</addtitle><addtitle>IEEE SENS J</addtitle><description>Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. However, global connectivity and resource constrained characteristics of smart devices have exposed them to different insider and outsider attacks, which put users' security and privacy at risk. Various risks associated with IoT slow down its growth and become an obstruction in the worldwide adoption of its applications. In RFC 6550, the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) is specified by IETF's ROLL working group for facilitating efficient routing in 6LoWPAN networks, while considering its limitations. Due to resource constrained nature of nodes in the IoT, RPL is vulnerable to many attacks that consume the node's resources and degrade the network's performance. In this paper, we present a study on various attacks and their existing defense solutions, particularly to RPL. Open research issues, challenges, and future directions specific to RPL security are also discussed. A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding. In addition, a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is also carried out.</description><subject>6LoWPAN</subject><subject>Electronic devices</subject><subject>Embedded systems</subject><subject>Engineering</subject><subject>Engineering, Electrical &amp; Electronic</subject><subject>Instruments &amp; Instrumentation</subject><subject>Internet of Things</subject><subject>IP (Internet Protocol)</subject><subject>LLN</subject><subject>network security</subject><subject>Physical Sciences</subject><subject>Physics</subject><subject>Physics, Applied</subject><subject>Routing</subject><subject>Routing protocols</subject><subject>RPL</subject><subject>Science &amp; Technology</subject><subject>Security</subject><subject>Sensors</subject><subject>Taxonomy</subject><subject>Technology</subject><subject>Topology</subject><subject>Wireless sensor networks</subject><issn>1530-437X</issn><issn>1558-1748</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>AOWDO</sourceid><recordid>eNqNkE1P3DAQhqOKSnyUH4C4WOoRZRl_xXZv2xXlQ6tlBVTtLUqcMRhoDLa3q_33JFpUrj3Ne3ieGc1bFEcUJpSCOb26PVtMGDCYMKN4pdSnYo9KqUuqhN4ZM4dScPV7t9hP6RGAGiXVXnF1i3YVfd6Q4MjNck6-Nwk7Us3Dr-V0QRaY1yE-JeJ7kh-QXPYZY495pO8efH-fvpEpucG_Htdfis-ueU54-D4Pip8_zu5mF-X8-vxyNp2XlhmeS9ZW1LSNaFpaOcm1FNYaUdGWyU5a59ApkEJRK5kBw7tOGMFMxaVxHbQN5wfF1-3elxheV5hy_RhWsR9O1kwMjwGrWDVQdEvZGFKK6OqX6P80cVNTqMfK6rGyeqysfq9scE62zhrb4JL12Fv85wGA5IJp0EMCNtD6_-mZz032oZ-FVZ8H9XiresQPRRujmTb8DV0chY0</recordid><startdate>20200601</startdate><enddate>20200601</enddate><creator>Verma, Abhishek</creator><creator>Ranga, Virender</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AOWDO</scope><scope>BLEPL</scope><scope>DTL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7U5</scope><scope>8FD</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0002-2046-8642</orcidid><orcidid>https://orcid.org/0000-0001-6687-4809</orcidid></search><sort><creationdate>20200601</creationdate><title>Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review</title><author>Verma, Abhishek ; Ranga, Virender</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-2b619ba4ab16f53854cc9461b25d5cffef705471c529093dd494296359fd0ba33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>6LoWPAN</topic><topic>Electronic devices</topic><topic>Embedded systems</topic><topic>Engineering</topic><topic>Engineering, Electrical &amp; Electronic</topic><topic>Instruments &amp; Instrumentation</topic><topic>Internet of Things</topic><topic>IP (Internet Protocol)</topic><topic>LLN</topic><topic>network security</topic><topic>Physical Sciences</topic><topic>Physics</topic><topic>Physics, Applied</topic><topic>Routing</topic><topic>Routing protocols</topic><topic>RPL</topic><topic>Science &amp; Technology</topic><topic>Security</topic><topic>Sensors</topic><topic>Taxonomy</topic><topic>Technology</topic><topic>Topology</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Verma, Abhishek</creatorcontrib><creatorcontrib>Ranga, Virender</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Web of Science - Science Citation Index Expanded - 2020</collection><collection>Web of Science Core Collection</collection><collection>Science Citation Index Expanded</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE sensors journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Verma, Abhishek</au><au>Ranga, Virender</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review</atitle><jtitle>IEEE sensors journal</jtitle><stitle>JSEN</stitle><stitle>IEEE SENS J</stitle><date>2020-06-01</date><risdate>2020</risdate><volume>20</volume><issue>11</issue><spage>5666</spage><epage>5690</epage><pages>5666-5690</pages><issn>1530-437X</issn><eissn>1558-1748</eissn><coden>ISJEAZ</coden><abstract>Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. However, global connectivity and resource constrained characteristics of smart devices have exposed them to different insider and outsider attacks, which put users' security and privacy at risk. Various risks associated with IoT slow down its growth and become an obstruction in the worldwide adoption of its applications. In RFC 6550, the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) is specified by IETF's ROLL working group for facilitating efficient routing in 6LoWPAN networks, while considering its limitations. Due to resource constrained nature of nodes in the IoT, RPL is vulnerable to many attacks that consume the node's resources and degrade the network's performance. In this paper, we present a study on various attacks and their existing defense solutions, particularly to RPL. Open research issues, challenges, and future directions specific to RPL security are also discussed. A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding. In addition, a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is also carried out.</abstract><cop>PISCATAWAY</cop><pub>IEEE</pub><doi>10.1109/JSEN.2020.2973677</doi><tpages>25</tpages><orcidid>https://orcid.org/0000-0002-2046-8642</orcidid><orcidid>https://orcid.org/0000-0001-6687-4809</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1530-437X
ispartof IEEE sensors journal, 2020-06, Vol.20 (11), p.5666-5690
issn 1530-437X
1558-1748
language eng
recordid cdi_ieee_primary_8998289
source IEEE Electronic Library (IEL)
subjects 6LoWPAN
Electronic devices
Embedded systems
Engineering
Engineering, Electrical & Electronic
Instruments & Instrumentation
Internet of Things
IP (Internet Protocol)
LLN
network security
Physical Sciences
Physics
Physics, Applied
Routing
Routing protocols
RPL
Science & Technology
Security
Sensors
Taxonomy
Technology
Topology
Wireless sensor networks
title Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-15T02%3A05%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20of%20RPL%20Based%206LoWPAN%20Networks%20in%20the%20Internet%20of%20Things:%20A%20Review&rft.jtitle=IEEE%20sensors%20journal&rft.au=Verma,%20Abhishek&rft.date=2020-06-01&rft.volume=20&rft.issue=11&rft.spage=5666&rft.epage=5690&rft.pages=5666-5690&rft.issn=1530-437X&rft.eissn=1558-1748&rft.coden=ISJEAZ&rft_id=info:doi/10.1109/JSEN.2020.2973677&rft_dat=%3Cproquest_RIE%3E2400102626%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2400102626&rft_id=info:pmid/&rft_ieee_id=8998289&rfr_iscdi=true