A Review on the Security of IoT Networks: From Network Layer’s Perspective
Internet of Things (IoT) has revolutionized the world in the last decade. Today millions of devices are connected to each other utilizing IoT technology in one way or the other. With the significant growth in IoT devices, the provision of IoT security is imperative. Routing protocol for low power an...
Saved in:
| Main Authors: | , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2023-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10047861/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849330131074547712 |
|---|---|
| author | Asma Jahangeer Sibghat Ullah Bazai Saad Aslam Shah Marjan Muhammad Anas Sayed Habibullah Hashemi |
| author_facet | Asma Jahangeer Sibghat Ullah Bazai Saad Aslam Shah Marjan Muhammad Anas Sayed Habibullah Hashemi |
| author_sort | Asma Jahangeer |
| collection | DOAJ |
| description | Internet of Things (IoT) has revolutionized the world in the last decade. Today millions of devices are connected to each other utilizing IoT technology in one way or the other. With the significant growth in IoT devices, the provision of IoT security is imperative. Routing protocol for low power and lossy networks (RPL) is a network layer protocol, specially designed for routing in IoT devices. RPL protocol faces many attacks such as selective forwarding attacks, blackhole attacks, sybil attacks, wormhole attacks, and sinkhole attacks. All these attacks pose great threats to IoT networks and can substantially affect the performance of the network. In this work, a comprehensive review of internal attacks on the network layer is presented. Specifically, we focus on the literature that considers presenting solutions for the detection and prevention of sinkhole attacks. We reviewed the state-of-the-art works and different performance parameters like energy consumption, scalability, threshold value, packet delivery ratio, and throughput. Moreover, we also present a detailed analysis of machine learning-based algorithms and techniques proposed for the security of RPL protocol against internal attacks. |
| format | Article |
| id | doaj-art-82ddd82cafe747f9a1a497fc4b69bddf |
| institution | Kabale University |
| issn | 2169-3536 |
| language | English |
| publishDate | 2023-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Access |
| spelling | doaj-art-82ddd82cafe747f9a1a497fc4b69bddf2025-08-20T03:47:03ZengIEEEIEEE Access2169-35362023-01-0111710737108710.1109/ACCESS.2023.324618010047861A Review on the Security of IoT Networks: From Network Layer’s PerspectiveAsma Jahangeer0Sibghat Ullah Bazai1https://orcid.org/0000-0003-3042-5977Saad Aslam2https://orcid.org/0000-0003-3890-1245Shah Marjan3https://orcid.org/0000-0001-9163-0259Muhammad Anas4Sayed Habibullah Hashemi5https://orcid.org/0009-0008-2122-5096Department of Computer Science, Engineering and Management Sciences, Balochistan University of Information Technology, Quetta, PakistanDepartment of Computer Science, Engineering and Management Sciences, Balochistan University of Information Technology, Quetta, PakistanDepartment of Computing and Information Systems, School of Engineering and Technology, Sunway University, Selangor, MalaysiaDepartment of Software Engineering, Engineering and Management Sciences, Balochistan University of Information Technology, Quetta, PakistanDepartment of Computer Science, Engineering and Management Sciences, Balochistan University of Information Technology, Quetta, PakistanDepartment of Physics, Paktia University, Gardez, Paktia, AfghanistanInternet of Things (IoT) has revolutionized the world in the last decade. Today millions of devices are connected to each other utilizing IoT technology in one way or the other. With the significant growth in IoT devices, the provision of IoT security is imperative. Routing protocol for low power and lossy networks (RPL) is a network layer protocol, specially designed for routing in IoT devices. RPL protocol faces many attacks such as selective forwarding attacks, blackhole attacks, sybil attacks, wormhole attacks, and sinkhole attacks. All these attacks pose great threats to IoT networks and can substantially affect the performance of the network. In this work, a comprehensive review of internal attacks on the network layer is presented. Specifically, we focus on the literature that considers presenting solutions for the detection and prevention of sinkhole attacks. We reviewed the state-of-the-art works and different performance parameters like energy consumption, scalability, threshold value, packet delivery ratio, and throughput. Moreover, we also present a detailed analysis of machine learning-based algorithms and techniques proposed for the security of RPL protocol against internal attacks.https://ieeexplore.ieee.org/document/10047861/IoTmachine learningnetwork layerRPLsinkhole attack |
| spellingShingle | Asma Jahangeer Sibghat Ullah Bazai Saad Aslam Shah Marjan Muhammad Anas Sayed Habibullah Hashemi A Review on the Security of IoT Networks: From Network Layer’s Perspective IEEE Access IoT machine learning network layer RPL sinkhole attack |
| title | A Review on the Security of IoT Networks: From Network Layer’s Perspective |
| title_full | A Review on the Security of IoT Networks: From Network Layer’s Perspective |
| title_fullStr | A Review on the Security of IoT Networks: From Network Layer’s Perspective |
| title_full_unstemmed | A Review on the Security of IoT Networks: From Network Layer’s Perspective |
| title_short | A Review on the Security of IoT Networks: From Network Layer’s Perspective |
| title_sort | review on the security of iot networks from network layer x2019 s perspective |
| topic | IoT machine learning network layer RPL sinkhole attack |
| url | https://ieeexplore.ieee.org/document/10047861/ |
| work_keys_str_mv | AT asmajahangeer areviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective AT sibghatullahbazai areviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective AT saadaslam areviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective AT shahmarjan areviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective AT muhammadanas areviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective AT sayedhabibullahhashemi areviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective AT asmajahangeer reviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective AT sibghatullahbazai reviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective AT saadaslam reviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective AT shahmarjan reviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective AT muhammadanas reviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective AT sayedhabibullahhashemi reviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective |