A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things
The proliferation of the Internet of Things (IoT) has attracted different sectors such as agriculture, manufacturing, smart cities, transportation, etc. to adopt these technologies. Most IoT networks utilize Routing Protocol for Low Power and Lossy Networks (RPL) to exchange control and data packets...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Escuela Politécnica Nacional (EPN)
2025-01-01
|
Series: | Latin-American Journal of Computing |
Subjects: | |
Online Access: | https://lajc.epn.edu.ec/index.php/LAJC/article/view/417 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832096514228355072 |
---|---|
author | Lanka Chris Sejaphala Vusimuzi Malele Francis Lugayizi |
author_facet | Lanka Chris Sejaphala Vusimuzi Malele Francis Lugayizi |
author_sort | Lanka Chris Sejaphala |
collection | DOAJ |
description | The proliferation of the Internet of Things (IoT) has attracted different sectors such as agriculture, manufacturing, smart cities, transportation, etc. to adopt these technologies. Most IoT networks utilize Routing Protocol for Low Power and Lossy Networks (RPL) to exchange control and data packets across the network. However, RPL is susceptible to routing attacks such as rank attacks, DIS-flooding, etc. In recent years different defense techniques have been proposed to act against these attacks i.e., Secure-Protocol, conventional Intrusion Detection Systems (IDS), and Machine Learning (ML)-based. This systematic literature review explores 39 published papers in the domain of defense techniques against routing attacks in RPL-based IoT. We review. The findings of this study suggest that most Secure-Protocol can detect and mitigate routing attacks utilizing distributed placement, ML-based can detect most attacks but lack mitigation mechanisms, and conventional IDS technique utilizes a hybrid approach in detection and placement strategies. Additionally, this study reveals that India publishes more research papers in ML-based and Secure-Protocol. Furthermore, flooding attacks are the most discussed attacks in the selected studies. Finally, Cooja Contiki is the most used simulation tool. |
format | Article |
id | doaj-art-5c56afcbadd84d26b05a9562362f77db |
institution | Kabale University |
issn | 1390-9266 1390-9134 |
language | English |
publishDate | 2025-01-01 |
publisher | Escuela Politécnica Nacional (EPN) |
record_format | Article |
series | Latin-American Journal of Computing |
spelling | doaj-art-5c56afcbadd84d26b05a9562362f77db2025-02-05T14:49:41ZengEscuela Politécnica Nacional (EPN)Latin-American Journal of Computing1390-92661390-91342025-01-011213549417A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of ThingsLanka Chris Sejaphala0Vusimuzi Malele1Francis Lugayizi2North West UniversityNorth West UniversityNorth-West UniversityThe proliferation of the Internet of Things (IoT) has attracted different sectors such as agriculture, manufacturing, smart cities, transportation, etc. to adopt these technologies. Most IoT networks utilize Routing Protocol for Low Power and Lossy Networks (RPL) to exchange control and data packets across the network. However, RPL is susceptible to routing attacks such as rank attacks, DIS-flooding, etc. In recent years different defense techniques have been proposed to act against these attacks i.e., Secure-Protocol, conventional Intrusion Detection Systems (IDS), and Machine Learning (ML)-based. This systematic literature review explores 39 published papers in the domain of defense techniques against routing attacks in RPL-based IoT. We review. The findings of this study suggest that most Secure-Protocol can detect and mitigate routing attacks utilizing distributed placement, ML-based can detect most attacks but lack mitigation mechanisms, and conventional IDS technique utilizes a hybrid approach in detection and placement strategies. Additionally, this study reveals that India publishes more research papers in ML-based and Secure-Protocol. Furthermore, flooding attacks are the most discussed attacks in the selected studies. Finally, Cooja Contiki is the most used simulation tool.https://lajc.epn.edu.ec/index.php/LAJC/article/view/417defense techniquerplrouting attacksiot |
spellingShingle | Lanka Chris Sejaphala Vusimuzi Malele Francis Lugayizi A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things Latin-American Journal of Computing defense technique rpl routing attacks iot |
title | A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things |
title_full | A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things |
title_fullStr | A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things |
title_full_unstemmed | A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things |
title_short | A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things |
title_sort | systematic literature review on defense techniques against routing attacks in internet of things |
topic | defense technique rpl routing attacks iot |
url | https://lajc.epn.edu.ec/index.php/LAJC/article/view/417 |
work_keys_str_mv | AT lankachrissejaphala asystematicliteraturereviewondefensetechniquesagainstroutingattacksininternetofthings AT vusimuzimalele asystematicliteraturereviewondefensetechniquesagainstroutingattacksininternetofthings AT francislugayizi asystematicliteraturereviewondefensetechniquesagainstroutingattacksininternetofthings AT lankachrissejaphala systematicliteraturereviewondefensetechniquesagainstroutingattacksininternetofthings AT vusimuzimalele systematicliteraturereviewondefensetechniquesagainstroutingattacksininternetofthings AT francislugayizi systematicliteraturereviewondefensetechniquesagainstroutingattacksininternetofthings |