A Review on the Security of IoT Networks: From Network Layer’s Perspective

Internet of Things (IoT) has revolutionized the world in the last decade. Today millions of devices are connected to each other utilizing IoT technology in one way or the other. With the significant growth in IoT devices, the provision of IoT security is imperative. Routing protocol for low power an...

Full description

Saved in:
Bibliographic Details
Main Authors: Asma Jahangeer, Sibghat Ullah Bazai, Saad Aslam, Shah Marjan, Muhammad Anas, Sayed Habibullah Hashemi
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10047861/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849330131074547712
author Asma Jahangeer
Sibghat Ullah Bazai
Saad Aslam
Shah Marjan
Muhammad Anas
Sayed Habibullah Hashemi
author_facet Asma Jahangeer
Sibghat Ullah Bazai
Saad Aslam
Shah Marjan
Muhammad Anas
Sayed Habibullah Hashemi
author_sort Asma Jahangeer
collection DOAJ
description Internet of Things (IoT) has revolutionized the world in the last decade. Today millions of devices are connected to each other utilizing IoT technology in one way or the other. With the significant growth in IoT devices, the provision of IoT security is imperative. Routing protocol for low power and lossy networks (RPL) is a network layer protocol, specially designed for routing in IoT devices. RPL protocol faces many attacks such as selective forwarding attacks, blackhole attacks, sybil attacks, wormhole attacks, and sinkhole attacks. All these attacks pose great threats to IoT networks and can substantially affect the performance of the network. In this work, a comprehensive review of internal attacks on the network layer is presented. Specifically, we focus on the literature that considers presenting solutions for the detection and prevention of sinkhole attacks. We reviewed the state-of-the-art works and different performance parameters like energy consumption, scalability, threshold value, packet delivery ratio, and throughput. Moreover, we also present a detailed analysis of machine learning-based algorithms and techniques proposed for the security of RPL protocol against internal attacks.
format Article
id doaj-art-82ddd82cafe747f9a1a497fc4b69bddf
institution Kabale University
issn 2169-3536
language English
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-82ddd82cafe747f9a1a497fc4b69bddf2025-08-20T03:47:03ZengIEEEIEEE Access2169-35362023-01-0111710737108710.1109/ACCESS.2023.324618010047861A Review on the Security of IoT Networks: From Network Layer’s PerspectiveAsma Jahangeer0Sibghat Ullah Bazai1https://orcid.org/0000-0003-3042-5977Saad Aslam2https://orcid.org/0000-0003-3890-1245Shah Marjan3https://orcid.org/0000-0001-9163-0259Muhammad Anas4Sayed Habibullah Hashemi5https://orcid.org/0009-0008-2122-5096Department of Computer Science, Engineering and Management Sciences, Balochistan University of Information Technology, Quetta, PakistanDepartment of Computer Science, Engineering and Management Sciences, Balochistan University of Information Technology, Quetta, PakistanDepartment of Computing and Information Systems, School of Engineering and Technology, Sunway University, Selangor, MalaysiaDepartment of Software Engineering, Engineering and Management Sciences, Balochistan University of Information Technology, Quetta, PakistanDepartment of Computer Science, Engineering and Management Sciences, Balochistan University of Information Technology, Quetta, PakistanDepartment of Physics, Paktia University, Gardez, Paktia, AfghanistanInternet of Things (IoT) has revolutionized the world in the last decade. Today millions of devices are connected to each other utilizing IoT technology in one way or the other. With the significant growth in IoT devices, the provision of IoT security is imperative. Routing protocol for low power and lossy networks (RPL) is a network layer protocol, specially designed for routing in IoT devices. RPL protocol faces many attacks such as selective forwarding attacks, blackhole attacks, sybil attacks, wormhole attacks, and sinkhole attacks. All these attacks pose great threats to IoT networks and can substantially affect the performance of the network. In this work, a comprehensive review of internal attacks on the network layer is presented. Specifically, we focus on the literature that considers presenting solutions for the detection and prevention of sinkhole attacks. We reviewed the state-of-the-art works and different performance parameters like energy consumption, scalability, threshold value, packet delivery ratio, and throughput. Moreover, we also present a detailed analysis of machine learning-based algorithms and techniques proposed for the security of RPL protocol against internal attacks.https://ieeexplore.ieee.org/document/10047861/IoTmachine learningnetwork layerRPLsinkhole attack
spellingShingle Asma Jahangeer
Sibghat Ullah Bazai
Saad Aslam
Shah Marjan
Muhammad Anas
Sayed Habibullah Hashemi
A Review on the Security of IoT Networks: From Network Layer’s Perspective
IEEE Access
IoT
machine learning
network layer
RPL
sinkhole attack
title A Review on the Security of IoT Networks: From Network Layer’s Perspective
title_full A Review on the Security of IoT Networks: From Network Layer’s Perspective
title_fullStr A Review on the Security of IoT Networks: From Network Layer’s Perspective
title_full_unstemmed A Review on the Security of IoT Networks: From Network Layer’s Perspective
title_short A Review on the Security of IoT Networks: From Network Layer’s Perspective
title_sort review on the security of iot networks from network layer x2019 s perspective
topic IoT
machine learning
network layer
RPL
sinkhole attack
url https://ieeexplore.ieee.org/document/10047861/
work_keys_str_mv AT asmajahangeer areviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective
AT sibghatullahbazai areviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective
AT saadaslam areviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective
AT shahmarjan areviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective
AT muhammadanas areviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective
AT sayedhabibullahhashemi areviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective
AT asmajahangeer reviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective
AT sibghatullahbazai reviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective
AT saadaslam reviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective
AT shahmarjan reviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective
AT muhammadanas reviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective
AT sayedhabibullahhashemi reviewonthesecurityofiotnetworksfromnetworklayerx2019sperspective