A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things

The proliferation of the Internet of Things (IoT) has attracted different sectors such as agriculture, manufacturing, smart cities, transportation, etc. to adopt these technologies. Most IoT networks utilize Routing Protocol for Low Power and Lossy Networks (RPL) to exchange control and data packets...

Full description

Saved in:
Bibliographic Details
Main Authors: Lanka Chris Sejaphala, Vusimuzi Malele, Francis Lugayizi
Format: Article
Language:English
Published: Escuela Politécnica Nacional (EPN) 2025-01-01
Series:Latin-American Journal of Computing
Subjects:
Online Access:https://lajc.epn.edu.ec/index.php/LAJC/article/view/417
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832096514228355072
author Lanka Chris Sejaphala
Vusimuzi Malele
Francis Lugayizi
author_facet Lanka Chris Sejaphala
Vusimuzi Malele
Francis Lugayizi
author_sort Lanka Chris Sejaphala
collection DOAJ
description The proliferation of the Internet of Things (IoT) has attracted different sectors such as agriculture, manufacturing, smart cities, transportation, etc. to adopt these technologies. Most IoT networks utilize Routing Protocol for Low Power and Lossy Networks (RPL) to exchange control and data packets across the network. However, RPL is susceptible to routing attacks such as rank attacks, DIS-flooding, etc. In recent years different defense techniques have been proposed to act against these attacks i.e., Secure-Protocol, conventional Intrusion Detection Systems (IDS), and Machine Learning (ML)-based. This systematic literature review explores 39 published papers in the domain of defense techniques against routing attacks in RPL-based IoT. We review. The findings of this study suggest that most Secure-Protocol can detect and mitigate routing attacks utilizing distributed placement, ML-based can detect most attacks but lack mitigation mechanisms, and conventional IDS technique utilizes a hybrid approach in detection and placement strategies. Additionally, this study reveals that India publishes more research papers in ML-based and Secure-Protocol. Furthermore, flooding attacks are the most discussed attacks in the selected studies. Finally, Cooja Contiki is the most used simulation tool.
format Article
id doaj-art-5c56afcbadd84d26b05a9562362f77db
institution Kabale University
issn 1390-9266
1390-9134
language English
publishDate 2025-01-01
publisher Escuela Politécnica Nacional (EPN)
record_format Article
series Latin-American Journal of Computing
spelling doaj-art-5c56afcbadd84d26b05a9562362f77db2025-02-05T14:49:41ZengEscuela Politécnica Nacional (EPN)Latin-American Journal of Computing1390-92661390-91342025-01-011213549417A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of ThingsLanka Chris Sejaphala0Vusimuzi Malele1Francis Lugayizi2North West UniversityNorth West UniversityNorth-West UniversityThe proliferation of the Internet of Things (IoT) has attracted different sectors such as agriculture, manufacturing, smart cities, transportation, etc. to adopt these technologies. Most IoT networks utilize Routing Protocol for Low Power and Lossy Networks (RPL) to exchange control and data packets across the network. However, RPL is susceptible to routing attacks such as rank attacks, DIS-flooding, etc. In recent years different defense techniques have been proposed to act against these attacks i.e., Secure-Protocol, conventional Intrusion Detection Systems (IDS), and Machine Learning (ML)-based. This systematic literature review explores 39 published papers in the domain of defense techniques against routing attacks in RPL-based IoT. We review. The findings of this study suggest that most Secure-Protocol can detect and mitigate routing attacks utilizing distributed placement, ML-based can detect most attacks but lack mitigation mechanisms, and conventional IDS technique utilizes a hybrid approach in detection and placement strategies. Additionally, this study reveals that India publishes more research papers in ML-based and Secure-Protocol. Furthermore, flooding attacks are the most discussed attacks in the selected studies. Finally, Cooja Contiki is the most used simulation tool.https://lajc.epn.edu.ec/index.php/LAJC/article/view/417defense techniquerplrouting attacksiot
spellingShingle Lanka Chris Sejaphala
Vusimuzi Malele
Francis Lugayizi
A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things
Latin-American Journal of Computing
defense technique
rpl
routing attacks
iot
title A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things
title_full A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things
title_fullStr A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things
title_full_unstemmed A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things
title_short A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things
title_sort systematic literature review on defense techniques against routing attacks in internet of things
topic defense technique
rpl
routing attacks
iot
url https://lajc.epn.edu.ec/index.php/LAJC/article/view/417
work_keys_str_mv AT lankachrissejaphala asystematicliteraturereviewondefensetechniquesagainstroutingattacksininternetofthings
AT vusimuzimalele asystematicliteraturereviewondefensetechniquesagainstroutingattacksininternetofthings
AT francislugayizi asystematicliteraturereviewondefensetechniquesagainstroutingattacksininternetofthings
AT lankachrissejaphala systematicliteraturereviewondefensetechniquesagainstroutingattacksininternetofthings
AT vusimuzimalele systematicliteraturereviewondefensetechniquesagainstroutingattacksininternetofthings
AT francislugayizi systematicliteraturereviewondefensetechniquesagainstroutingattacksininternetofthings