IEEE Access (Jan 2024)

Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy

  • Nadia A. Alfriehat,
  • Mohammed Anbar,
  • Shankar Karuppayah,
  • Shaza Dawood Ahmed Rihan,
  • Basim Ahmad Alabsi,
  • Alaa M. Momani

DOI
https://doi.org/10.1109/ACCESS.2024.3368633
Journal volume & issue
Vol. 12
pp. 31136 – 31158

Abstract

Read online

The internet of things (IoT) is an emerging technological advancement with significant implications. It connects a wireless sensor or node network via low-power and lossy networks (LLN). The routing protocol over a low-power and lossy network (RPL) is the fundamental component of LLN. Its lightweight design effectively addresses the limitations imposed by bandwidth, energy, and memory on both LLNs and IoT devices. Notwithstanding its efficacy, RPL introduces susceptibilities, including the version number attack (VNA), which underscores the need for IoT systems to implement effective security protocols. This work reviews and categorizes the security mechanisms proposed in the literature to detect VNA against RPL-based IoT networks. The existing mechanisms are thoroughly discussed and analyzed regarding their performance, datasets, implementation details, and limitations. Furthermore, a qualitative comparison is presented to benchmark this work against existing studies, showcasing its uniqueness. Finally, this work analyzes research gaps and proposes future research avenues.

Keywords