Next Article in Journal
Paper Sludge Carbon as an Adsorbent for Fukushima Radiocontaminated Paddy Soil
Next Article in Special Issue
Artificial Intelligence Evolution in Smart Buildings for Energy Efficiency
Previous Article in Journal
A Vision-Based Two-Stage Framework for Inferring Physical Properties of the Terrain
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT

1
Departamento de Ingenieria de Sistemas, Universidad del Norte, Barranquilla 081007, Colombia
2
Departamento de Ingenieria en Telecomunicaciones, Universidad Nacional Autonoma de Mexico, Ciudad de Mexico 04510, Mexico
*
Author to whom correspondence should be addressed.
Appl. Sci. 2020, 10(18), 6472; https://doi.org/10.3390/app10186472
Submission received: 9 July 2020 / Revised: 1 September 2020 / Accepted: 7 September 2020 / Published: 17 September 2020
(This article belongs to the Special Issue Artificial Intelligence and Emerging Technologies)

Abstract

:
The Internet of things (IoT) is a concept that has gained traction over the last decade. IoT networks have evolved around the wireless sensor network (WSN), and the following research looks at relevant IoT concepts and the different security issues that occur specifically at the network layer. This analysis is performed using a structured literature review (SLR). This form of bibliographic review has been a trend in recent years. Its strength is the performance of a bibliometric analysis that allows studying both trends in the line of research that you want to address and the relevant authors. This SLR reviews 53 proposals between 2011 and 2020, whose contribution is to mitigate attacks in the RPL (Routing Protocol for Low-Power and Lossy Networks) protocol. The revised proposals emerged after selecting keywords and databases in which to apply the search. Initially, approximately 380 research works appeared, for which it was necessary to continue using filters to refine the proposals to be included. After reading titles and abstracts, 53 papers were finally selected. In addition to analyzing the attacks mitigated in the RPL protocol, it is intended to identify the trend by which these attacks are reduced, as a result of the review, nine attacks have been found: rank, blackhole, selective forwarding, wormhole, DODAG (Destination-Oriented Directed Acyclic Graph) version number, DAO (Destination Advertisement Object) inconsistency, DIO (DODAG Information Object) suppression, Sybil, and sinkhole. Each of the 53 proposals analyzed in this review has an associated mitigation strategy, these strategies have been categorized into four groups, based on authentication or cryptography, based on network monitoring, based on secure parent node selection and other. According to the results, the authors’ primary mitigation strategy is based on network monitoring, with 30%. This review also identifies the principal authors and countries that need the development of this line of research.

1. Introduction

Wireless sensor networks (WSN) are useful in today’s world, and their main benefit is the ability to monitor different scenarios remotely. There are several purposes to do it, such as making decisions based on the behavior of specific variables to avoid an event with a tragic consequence. Another purpose is to control objects remotely for different actions. WSN allows us, for example, to monitor hostile environments without the need to have a person present on site.
A common use of WSN can be found in the area of agriculture for irrigation systems. In healthcare, WSN has had a high impact because it provides immediate access to reading different critical variables in a patient. Early detection of some indicators in the patient’s health can mean the difference between life and death [1].
Another area in which WSNs have been applied is geology, and it is often necessary to monitor areas of difficult access such as volcanoes, rivers, and forests. However, despite the significant benefits WSN offer, various risks and obstacles remain. The biggest obstacle can be found in the low power of data processing, leading us to another, and it is the battery level. If a sensor raises its processing, it consumes more energy. This situation happens because sensors are designed to capture data and send them to a receiver responsible for performing the necessary processing, storing it, forwarding it, discarding it, and launching and alerting.
The low-cost sensor hardware and basic design with low processing lead to the lack of a security implementation that strengthens the system. Any network must be protected because it handles crucial data for its owners. Captured data are sent without incidents to a secure receiver. It is required for this information not to be altered by unauthorized people.
It is essential to mention that a system is never 100% safe, as there is always a type of vulnerability. Researchers work every day in order to mitigate these vulnerabilities and make the systems safer. Traditional computer networks have a strong advantage when compared with sensor networks [2], especially concerning a higher processing power. Resources in WSN are scarce, limiting the implementation of any security mechanisms to only those that can that operate with limited resources.
WSN allows us to implement monitoring systems in real time. Therefore the security of sensed data that will be transmitted must be guaranteed. However, due to their low processing level, they cannot support many processor-intensive security protocols, becoming the target of various security attacks [3]. Data protection in WSN links four aspects: authenticity, integrity, confidentiality, and availability of messages or data [4].
  • Confidentiality: Refers to the mechanisms that ensure that only authorized persons can access the available data.
  • Integrity: States the fact that the data transmitted is the same throughout its transmission.
  • Authenticity: Denotes the verification that must be done before sending data, the issuer must be known and belong to the network.
  • Availability: Refers to data being available at any time.
Each layer of the OSI (Open Systems Interconnection) model has its security considerations. In a network composed of sensors, there are mainly two layers involved, physical and link layers. Advanced sensors with higher processing capacity present a third layer, routing. Attacks against security are divided into two groups, passive and active. Passive attacks only access the system to gather data, and this group of attacks compromises the confidentiality of the system. On the other hand, active attacks cause damage to the system, alter data, or disable node members, allowing access to unauthorized members, among other things [5].
In recent times, a new concept has been emerging, the Internet of things (IoT), which refers to all things or objects connected to the Internet that can be accessed them remotely [6]. The basis of this paradigm is the wireless sensor network because, to control a "thing" remotely, it is necessary to do it through a sensor. Therefore, all the advantages and disadvantages of sensor networks are inherited by the Internet of things.
Architectures based on IoT are usually divided into three layers: perception, network, and application layer, as shown in Figure 1 and mentioned in [1,7,8,9].
  • Perception layer: dispositive like sensors, gateways, RFID (Radio Frequency Identification) tags, and barcode belong to this category. Its main task is to gather information.
  • Network layer: this layer is composed of various networks such as wired, wireless, private, and public. Its main task is to propagate and process information collected in the perception layer.
  • Application layer: the related user interfaces and services are always based on the characteristics of the applications such as an intelligent transport system, monitoring system environment, and remote medical system.
One of the fundamental bases of the Internet of things is sensor networks, which is one of the reasons IoT systems inherit the security risks present in WSN. The security of the system must consider each network component. It is always better to include security mechanisms parallel with the design of the architecture, which should be the correct approach. The wrong approach is to design an architecture and, in the end, try to add security to a system already developed. Through these lessons, to achieve a system with the minimum security requirements, it is fundamental that security must be integrated into all components of the network [11]. Unfortunately, as is the case with many internet protocols, security is only added in a later-final stage, with the result that the added security becomes a patch to the original protocol that is not the best nor the adequate solution. Sadly, the RPL (Routing Protocol for Low-Power and Lossy Networks) protocol follows this path, although there is still time security taken into consideration before RPL becomes more widely used by both academia and industry.
RPL [12] is a distance vector routing protocol based on the construction of a directed acyclic graph (DAG). A design based on distance vector is considered suitable for low power and loss networks (LLN) such as RPL. In [12,13], RPL is designed for restricted and IP-based environments because it is recognized as the Internet of Things (IoT) routing protocol. The construction of the RPL topology is developed through the creation of a tree. For this cause, the root starts the process, and this tree is built through the sending of control messages. Within the tree construction process, each node is assigned a rank, the rank tells the node how many jumps it is from the root, and the root node will have rank 0. In other words, the node’s rank corresponds to the level in the one inside the DAG. Within the terminology of this protocol, the term DODAG (destination-oriented DAG) is also known; it is a DAG rooted in a single destination, that is, in a single-root DAG (the root DODAG) which has no outgoing links. A DODAG is built using an objective function (FO) configured by the programmer, and this FO is used by the nodes to select its parent. Regarding control messages, RPL handles three types, and these are DIS (DODAG information solicitation), DIO (DODAG information object), and DAO (destination advertisement object). DIS is a control message used to request information from a DODAG, DIO is a down control message that allows a node to discover an instance of RPL, learn its configuration parameters, select a parent set, and maintain the DODAG. DAO is a control message that is used to propagate destination information up through the DODAG.
In [14], a work related to the classification of attacks in the RPL protocol is presented. However, the work has 23 references in total, and the most updated reference corresponds to the year 2016.
The literature shows us different types of attacks that can appear while using the RPL protocol, and these attacks and their consequences or impact are summarized in Table 1.
This paper presents an investigation about the attacks present in RPL and the mitigation mechanisms used in the literature. This research is exposed through a structured literature review (SLR) according to Massaro protocol presented in [23], and following these reviews [24,25,26]. The contribution of this research is to establish a starting point for new investigations regarding the attacks mitigated in the RPL protocol and the strategies used, that is: What attacks have been presented? How many contributions exist? If it exists or not, is there persistence in the authors’ research line, and what is the future trend? To date, there is no review of state of the art using the SLR methodology that can guide researchers regarding the development and contributions of existing publications. This situation becomes the contribution of this manuscript, to contribute to the literature an SLR review covering the proposals that mitigate attacks in RPL and their mitigation strategies. The main object of this paper is to show the progress of security aspects in RPL-protocol, and answer the following research questions. RQ1: What are the development issues in IoT in RPL-security? RQ2: What are the trends to solve the security problems of the RPL-protocol? RQ3: What is the trend of future research?

2. Research Selection Method

The selection process was divided into three steps: the first step was identifying the different search terms related to security in RPL. In the second step, for each database, we identified the advanced search system and entered the combination of the selected keywords. Then, once the papers were selected in the second step, a new filter was applied after reading their titles and abstracts.
In this SLR, the following search terms were used: RPL Secure, RPL Based Secure, Authentication Protocol and Security Routing Based RPL. Terms were selected after a brief study of the keywords used in the papers related to the line of research addressed in this SLR. As a first step, the most relevant keywords that could yield the desired search results were identified, that is, proposals for secure protocols based on RPL that would mitigate the attacks that are detailed in Table 1. Subsequently, the keywords that threw up a large number of papers and made it impossible to analyze each of them. Finally, the keywords removed in the previous step were combined to refine the search results. The terms finally selected were those that yielded quantitatively valid results for the analysis of this review.
The databases explored were IEEE, Science Direct, and Springer. These databases were selected because they host proposals for conferences and journals related to the area of computer science and electrical and electronic engineering. Results about the number of papers selected to the second and third steps are presented in Table 2.
The proposals selected for the analysis totaled 53. Review papers, or proposals implemented using a routing protocol other than RPL, were discarded (only proposals that concretely ensured the protocol’s security were taken into account). Among the proposals reviewed in this section, we found different mechanisms that improve the security of the RPL protocol, and these proposals will be discussed below.
Table 3 presents the coding for journals and conferences where papers were published, and Table 4 shows the type of paper coding. These codes are established in order to make reference to conferences, journals, and types of paper during the development of the manuscript in a simpler way.
The theme and approach coding is described in Table 5. Due to their operation, some attacks shown in Table 1 are related to each other. Therefore it has been decided to unite these attacks and analyze them as a group within this manuscript. Both the RA (rank attack) and the SIA (sinkhole attack) aim to attract network traffic to a specific node, so these two attacks make up an analysis group. SFA (selective forwarding) and BA (blackhole attack) work in the same way with the difference that all received packets are discarded in the BA attack, and in the SFA attack, the malicious node decides which packets to forward and which not. Finally, the DAA and DIA attacks have been united into a single group since they are related to modifying protocol control messages. These groups formed are detailed in Table 5 and are selected as the analysis topics following the SLR review structure.
3 mitigation strategies used by the authors have been identified, these are specified in Table 6, including the "others" category, in order to assign a category to those proposals that do not adapt to the 3 identified strategies.
Table 7 summarizes relevant data from 53 papers selected for this SLR according to Table 3, Table 4, Table 5 and Table 6. The first column gives the author name and year of publications of the proposal. Column 2 refers to the number of citations the proposal has at the time of submission of this review. Column 3 shows type code according to Table 4. Column 4 refers to the journal or conference code, according to Table 3. Columns 5–10 specifies the theme code according to Table 5. Columns 11–14 detail the approach code according to the table. Finally, the last column shows the proposal’s reference.

3. General Conclusions

For bibliographic analysis and citations, the bibliometrix package in RStudio [75] was used. It was possible to determine the most cited authors or the most productive countries. The analyzed papers were papers displayed in Table 7. Table 8 shows the primary information about data.
Percentages of paper approaches presented in Table 9 and Figure 2 are based on the papers analyzed, and the selected categories. According to the results, there are more significant proposals at the SP (Based on secure parent node selection) and NM (based on network monitoring) approach, followed by AC (based on authentication or cryptography) and OT (Other).
Annual scientific productions are shown in Figure 3a. Publications correspond to the years between 2011 and 2020. From this figure, it is concluded that the number of papers has increased over the years. However, throughout this period of time, the trend did not always increase, and there are some years in which production in the area decreased. Between the years 2011–2012, 2013–2014, and 2017–2019 there was a decrease of two, two, and six proposals, respectively.
The most relevant decrease occurs between the years 2017 and 2018. Details of the subjects studied in this period are shown in Figure 3b, it is observed that this decrease is mainly associated with the line of research associated with the subject RSA (Rank attack/Sinkhole attack) but there was an increase in research related to the D2A (DAO/DIS message inconsistency attack) issue. D2A is a group of two attacks that arise from the nature of RPL, affecting the DIO and DAO control messages. Therefore it can be concluded that, in 2018, researchers worked more to strengthen the security of the nature of the protocol compared to the previous year. For the rest of the subjects, the study remains almost constant.
The most productive authors are shown in Figure 4. There are two authors with two papers, four authors with three papers, and four authors with four papers. The above shows that these authors show continuity in the research topic.
Table 10 lists the contributions of the authors mentioned in Figure 4. From this table, we can obtain information that Figure 4 by itself does not provide. The authors S.K. Ray and J. Gutierrez are listed in Figure 4 with three contributions each, although these contributions are the same for both authors. The same happens with the authors D. Tandjaoui, F. Medjek, and N. Djedjig, for whom Figure 4 shows four contributions. Other information that can be inferred from Table 10 is the period of publication, and it is considered that these authors maintain their current research line, with 2019 or 2020 being the last year of publication, except for the authors T. Matsunaga and A. El Hajjar.
Figure 5 shows the most productive countries; a high concentration of publications are in Algeria, India, Iran, and New Zealand with three productions each.
Figure 6 locates on the world map of the four most productive countries in the line of research associated with this SLR. It can be seen that the productions come from the continents of Asia, Africa, and Oceania, with Africa being the continent that groups the largest countries. It can also be observed that Europe and America do not have publications on the subject.
Figure 7 shows the keyword co-occurrences. The network resulting from the analysis of keywords co-occurrences shows three significant groups. The green group shows the relationship of words such as wireless communications, energy consumption, hardware, authentication between others. Red group evidences the association between protocols, monitoring, topology, maintenance, and security. The blue group shows the relationship between words such as the internet of things, 6lowpan, IoT, trust, sinkhole attack, version number attack, sensors, and intrusion detection. The image shows us the closeness of these three groups, indicating their close relationship. The spheres’ size representing each of the keywords indicates their level of importance within the group. The larger the sphere, the more significant its relevance. Links indicate the relationship between keywords in the same group.
Figure 8 shows the number of theme code by the proposal. It means that 35 proposals were classified with one theme code, 11 proposals were classified with two theme codes, six proposals were classified with three theme codes, and one proposal was classified with four theme codes. Figure 8 also shows the inverse relationship between the number of attacks mitigated in a proposal and the number of proposals that mitigate that number of attacks. In other words, the higher the number of attacks mitigated in a single proposal there is, the lower the number of proposals found in the literature.
Figure 9 shows a Veen diagram detailing the number of proposals that mitigate one or a set of attacks. Seven proposals mitigate only the RSA attack. In this diagram, we can see that the attack with the most significant presence in the line of research reviewed is the attack encoded with the RSA theme code (See Table 5). Likewise, this is the attack that the authors mitigate in conjunction with other attacks in the same proposal. According to Figure 9, three proposals mitigate RSA and DNA, five proposals mitigate RSA and SBA (Selective forwarding/Blackhole attack), four proposals mitigate RSA, WA(Wormhole attack), and SBA, one proposal mitigates RSA, SBA, and SA (Sybil attack), one proposal mitigates RSA, D2A, and SA, and one proposal mitigates RSA, WA, D2A, and SA. It can also be concluded that this issue is mitigated in conjunction with all the attacks summarized in Table 5.
It can also be seen in Figure 9 that no attack is mitigated independently. There is at least one proposal in each category, mitigating a set of attacks, and that is why there is no isolated set in the view diagram. In the case of the D2A theme, this attack is mitigated in five proposals, four of them mitigate only this attack, but, in one proposal, it is mitigated together with the WA, SA, and RSA themes. Finally, it can be noted that no proposal mitigates all the attacks detailed here, as seen in Figure 8.
Tables and figures allow us to detail the following implications:
Implication 1: RPL security is a topic highly associated with the industry since the highest percentage of publications are in proceedings of international conferences (see Table 8).
Implication 2: The investigation takes strength in the field of security in RPL. Since its inception, its authors stated that this protocol did not manage security at the network layer. Therefore this has been a starting point for the investigation and implementation of mechanisms to mitigate attacks in this protocol (see Figure 3).
Implication 3: 10 authors have more than one publication in this SLR. This shows a trend of the persistence of researchers in the area. On the other hand, according to Table 8, the collaboration index is 2.65, which shows temporary work among the authors.
Implication 4: New Zealand is evidenced as a strong country at the level of technological research, according to Figure 5.
Implication 5: Of the five proposals for 2020, only one of them belongs to a conference, and the rest are part of journals. This is deduced given the global crisis experienced due to the Covid-19 pandemic, for which mass gatherings of people have been restricted, including academic or research conferences.
The statistics and taxonomy generated allow us to answer the research questions detailed in the introduction.
RQ1: What are the development issues in IoT in RPL attacks. Development issues in the RPL attacks are presented in Table 5, where themes are detailed. Each one of these attacks is described in section II. Table 5 shows attacks on the RPL protocols in layer 3. Some attacks are inherited from the WSN, like SA or WA. Attacks like DNA or D2A are attacks that arise from the logic of the protocol.
RQ2: What are the trends to solve the security problems of the RPL-protocol. Table 6 summarizes three principal groups into which this SLR divides the mechanisms to mitigate attacks on the RPL protocol. To mitigate attacks, the authors have designed strategies related to selecting a reliable parent in the design of the protocol topology, cryptography or authentication to change messages, and monitor the network for unusual behavior.
RQ3: What is the trend of future research. There is a tendency to improve the metrics of the RPL protocol. One of these metrics is energy consumption, given the nature of WSN, and it is necessary to maximize the lifetime to the sensors. In the protocol proposal [12], the authors affirm that they do not have security mechanisms implemented for the routing layer, leaving the line of investigation open to those who wish to improve the said protocol. In the first instance in the investigations, it was evidenced not to take into account the energy consumption, although, as a future trend, it is a metric that is intended to improve even so by implementing the security mechanisms.

4. Conclusions

This research presents an SLR for mitigating frequent attacks at the network layer in wireless sensor networks using the RPL protocol. It is essential to mention that the IoT security analysis must also be seen from the WSN perspective because the problems that are present in WSN are also inherited to IoT. As a general trend, this work emphasized how the provision of security related to IoT is gaining more attention in recent years, even though there is a decrease in literary production between 2017 and 2019, as shown in Figure 3a. In 2020 the publications of the year 2019 were already matched, and it is expected that, by the end of 2020, this production will increase in number.
According to the bibliographic review, nine attacks have been found: rank, blackhole, selective forwarding, wormhole, DODAG version number, DAO inconsistency, DIO suppression, Sybil, and sinkhole. Each of the 53 proposals analyzed in this review has an associated mitigation strategy, these strategies have been categorized into four groups: based on authentication or cryptography, based on network monitoring, based on secure parent node selection and other. According to the results, the primary mitigation strategy used by the authors is based on parent selection or trust model, with 36% (See Figure 2). Figure 4 shows that some authors have been constant in the investigation of the subject, and this is concluded because these authors have more than one proposal included in this review. An important conclusion is that there is a tendency to mitigate a single attack within a unique paper. This is evidenced in Figure 8, which shows that 35 proposals were classified with a thematic code. Only one research was classified with four thematic codes. This figure shows that the number of publications is inversely proportional to the number of mitigated attacks.
The implications made in this review were as follows: (1) RPL security is a topic highly associated with the industry since the highest percentage of publications are in proceedings of international conferences (see Table 8). (2) The investigation takes strength in the field of security in RPL. Since its inception, its authors stated that this protocol did not manage security at the network layer. Therefore this has been a starting point for the investigation and implementation of mechanisms to mitigate attacks in this protocol (see Figure 3). (3) 10 authors have more than one publication in this SLR. This situation shows a trend of the persistence of researchers in the area. On the other hand, according to Table 8, the collaboration index is 2.71, which shows temporary work among the authors. (4) New Zealand, India, Iran and Algeria are evidenced as strong countries at the level of technological research, according to Figure 5.
There is a tendency to improve the metrics of the RPL protocol. One of these metrics is energy consumption, given the nature of WSN, and it is necessary to maximize the lifetime to the sensors. In the protocol proposal [12], the authors affirm that they do not have security mechanisms implemented for the routing layer, leaving the line of investigation open to those who wish to improve the said protocol. In the first instance in the research, it was evidenced not to take into account the energy consumption. However, as a future trend, it is a metric that is intended to improve even by implementing the security mechanisms.
The biggest obstacle to developing security mechanisms for IoT is the nature of the network. The reason is that things or sensors are small devices with little processing capacity, which makes it challenging to execute robust algorithms that strengthen the security of the system. RPL does not have a defined implementation for its security operations, as the standard only advises on how to improve the security of the protocol. It is vital to continue working on strengthening the security aspects of RPL since even a small security flaw can be exploited and misused by third parties.

Author Contributions

K.A. proposed the structured literary review (SLR) structure for the preparation of the manuscript, and carried out the search for the documents to be reviewed. D.J. and J.G. divided the papers into groups according to the types of attacks and their solutions. K.A. wrote the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Universidad del Norte and the call 785 of Colciencias (Administrative Department of Science, Technology and Innovation).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Avila, K.; Sanmartin, P.; Jabba, D.; Jimeno, M. Applications Based on Service-Oriented Architecture (SOA) in the Field of Home Healthcare. Sensors 2017, 17, 1703. [Google Scholar] [CrossRef] [Green Version]
  2. Walters, J.P.; Liang, Z.; Shi, W.; Chaudhary, V. Wireless sensor network security: A survey. In Security in Distributed, Grid, and Pervasive Computing; Xiao, Y., Ed.; CRC Press, Publications: Boca Raton, FL, USA, 2007. [Google Scholar]
  3. Xiangyu, J.; Chao, W. The security routing research for WSN in the application of intelligent transport system. In Proceedings of the 2006 IEEE International Conference on Mechatronics and Automation, Luoyang, China, 25–28 June 2006; pp. 2318–2323. [Google Scholar]
  4. Azzabi, T.; Farhat, H.; Sahli, N. A survey on wireless sensor networks security issues and military specificities. In Proceedings of the 2017 International Conference on Advanced Systems and Electric Technologies (IC_ASET), Hammamet, Tunisia, 14–17 January 2017; pp. 66–72. [Google Scholar]
  5. Blilat, A.; Bouayad, A.; Chaoui, N.E.H.; El Ghazi, M. Wireless sensor network: Security challenges. In Proceedings of the 2012 National Days of Network Security and Systems (JNS2), Marrakech, Morocco, 20–21 April 2012; pp. 68–72. [Google Scholar]
  6. Airehrour, D.; Gutierrez, J.; Ray, S.K. Secure routing for internet of things: A survey. J. Netw. Comput. Appl. 2016, 66, 198–213. [Google Scholar] [CrossRef]
  7. Peng, S.Q.; Shen, H.B. Security Technology Analysis of IOT; Springer: Berlin/Heidelberg, Germany, 2015; pp. 401–408. [Google Scholar] [CrossRef]
  8. Ju, Z.; Li, Y. Analysis on internet of things (IOT) based on the “subway supermarket” e-commerce mode of TESCO. In Proceedings of the 2011 International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), Shenzhen, China, 26–27 November 2011; pp. 430–433. [Google Scholar]
  9. Viloria Núñez, C.A.; Sanmartín Mendoza, P.; Avila Hernández, K.; Jabba Molinares, D. Internet de las cosas y la salud centrada en el hogar. Revista científica salud uninorte. Rev. Salud Uninorte 2016, 32, 337–359. [Google Scholar]
  10. Kassab, W.A.; Darabkh, K.A. A–Z survey of Internet of Things: Architectures, protocols, applications, recent advances, future directions and recommendations. J. Netw. Comput. Appl. 2020, 163, 102663. [Google Scholar] [CrossRef]
  11. Oreku, G.S. Reliability in WSN for security: Mathematical approach. In Proceedings of the 2013 International Conference on Computer Applications Technology (ICCAT), Sousse, Tunisia, 20–22 January 2013; pp. 1–6. [Google Scholar]
  12. Thubert, P.; Winter, T.; Brandt, A.; Hui, J.; Kelsey, R.; Levis, P.; Pister, K.; Struik, R.; Vasseur, J.; Alexander, R. RPL: IPv6 Routing Protocol for Low power and Lossy Networks. Available online: https://tools.ietf.org/html/rfc6550 (accessed on 8 September 2020).
  13. Sanmartin, P.; Rojas, A.; Fernandez, L.; Avila, K.; Jabba, D.; Valle, S. Sigma Routing Metric for RPL Protocol. Sensors 2018, 18, 1277. [Google Scholar] [CrossRef] [Green Version]
  14. Sharma, D.; Mishra, I.; Jain, S. A Detailed Classification of Routing Attacks against RPL in Internet of Things. Int. J. Adv. Res. Ideas Innov. Technol. 2017, 3, 692–703. [Google Scholar]
  15. Glissa, G.; Rachedi, A.; Meddeb, A. A secure routing protocol based on RPL for internet of things. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–7. [Google Scholar]
  16. Sahay, R.; Geethakumari, G.; Modugu, K. Attack graph—Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT. In Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 5–8 February 2018; pp. 308–313. [Google Scholar]
  17. Rai, K.K.; Asawa, K. Impact analysis of rank attack with spoofed IP on routing in 6LoWPAN network. In Proceedings of the 2017 Tenth International Conference on Contemporary Computing (IC3), Noida, India, 10–12 August 2017; pp. 1–5. [Google Scholar]
  18. Khan, F.I.; Taeshik, S.; Taekkyeun, L.; Kihyung, K. Wormhole attack prevention mechanism for RPL based LLN network. In Proceedings of the 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN), Da Nang, Vietnam, 2–5 July 2013; pp. 149–154. [Google Scholar]
  19. Nan, J.; Jianfei, L.; Wei, X.; Hongzhou, S. Routing attacks prevention mechanism for RPL based on micropayment scheme. In Proceedings of the 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 23–25 March 2016; pp. 835–841. [Google Scholar]
  20. Pu, C. Mitigating DAO inconsistency attack in RPL-based low power and lossy networks. In Proceedings of the 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 8–10 January 2018; pp. 570–574. [Google Scholar]
  21. Perazzo, P.; Vallati, C.; Anastasi, G.; Dini, G. DIO Suppression Attack against Routing in the Internet of Things. IEEE Commun. Lett. 2017, 21, 2524–2527. [Google Scholar] [CrossRef]
  22. Nikam, A.; Ambawade, D. Opinion metric based intrusion detection mechanism for RPL protocol in IoT. In Proceedings of the 2018 3rd International Conference for Convergence in Technology (I2CT), Pune, India, 6–8 April 2018; pp. 1–6. [Google Scholar]
  23. Massaro, M.; Dumay, J.; Guthrie, J. On the shoulders of giants: Undertaking a structured literature review in accounting. Account. Audit. Account. J. 2016, 29, 767–801. [Google Scholar] [CrossRef]
  24. Ng, C.K.; Wu, C.H.; Yung, K.L.; Ip, W.H.; Cheung, T. A semantic similarity analysis of Internet of Things. Enterp. Inf. Syst. 2018, 12, 820–855. [Google Scholar] [CrossRef]
  25. Xu, L.D.; Duan, L. Big data for cyber physical systems in industry 4.0: A survey. Enterp. Inf. Syst. 2019, 13, 148–169. [Google Scholar] [CrossRef]
  26. Burton-Jones, A.; Akhlaghpour, S.; Ayre, S.; Barde, P.; Staib, A.; Sullivan, C. Changing the conversation on evaluating digital transformation in healthcare: Insights from an institutional analysis. Inf. Organ. 2020, 30, 100255. [Google Scholar] [CrossRef]
  27. Dvir, A.; Holczer, T.; Buttyan, L. VeRA—Version number and rank authentication in RPL. In Proceedings of the 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, Valencia, Spain, 17–22 October 2011; pp. 709–714. [Google Scholar]
  28. Le, A.; Loo, J.; Luo, Y.; Lasebae, A. Specification-based IDS for securing RPL from topology attacks. In Proceedings of the 2011 IFIP Wireless Days (WD), Niagara Falls, ON, Canada, 10–12 October 2011; pp. 1–3. [Google Scholar]
  29. Raza, S.; Wallgren, L.; Voigt, T. SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 2013, 11, 2661–2674. [Google Scholar] [CrossRef]
  30. Seeber, S.; Sehgal, A.; Stelte, B.; Rodosek, G.D.; Schonwalder, J. Towards a trust computing architecture for RPL in cyber physical systems. In Proceedings of the 2013 9th International Conference on Network and Service Management, IEEE, Zurich, Switzerland, 14–18 October 2013; pp. 134–137. [Google Scholar]
  31. Matsunaga, T.; Toyoda, K.; Sasase, I. Low false alarm rate RPL network monitoring system by considering timing inconstancy between the rank measurements. In Proceedings of the 2014 11th International Symposium on Wireless Communications Systems (ISWCS), Barcelona, Spain, 26–29 August 2014; pp. 427–431. [Google Scholar]
  32. Iuchi, K.; Matsunaga, T.; Toyoda, K.; Sasase, I. Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network. In Proceedings of the 2015 21st Asia-Pacific Conference on Communications (APCC), Kyoto, Japan, 14–16 October 2015; pp. 299–303. [Google Scholar]
  33. Djedjig, N.; Tandjaoui, D.; Medjek, F. Trust-based RPL for the Internet of Things. In Proceedings of the 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus, 6–9 July 2015; pp. 962–967. [Google Scholar]
  34. El Hajjar, A.; Roussos, G.; Paterson, M. On the performance of key pre-distribution for RPL-based IoT networks. In Interoperability, Safety and Security in IOT; Mitton, N., Chaouchi, H., Noel, T., Watteyne, T., Gabillon, A., Capolsini, P., Eds.; Springer: Berlin/Heidelberg, Germany, 2017; Volume 190, pp. 67–78. [Google Scholar]
  35. Airehrour, D.; Gutierrez, J.; Ray, S.K. Securing RPL routing protocol from blackhole attacks using a trust-based mechanism. In Proceedings of the 2016 26th International Telecommunication Networks and Applications Conference (ITNAC), Dunedin, New Zealand, 7–9 December 2016; pp. 115–120. [Google Scholar]
  36. Djedjig, N.; Tandjaoui, D.; Medjek, F.; Romdhani, I. New trust metric for the RPL routing protocol. In Proceedings of the 2017 8th International Conference on Information and Communication Systems (ICICS), Irbid, Jordan, 4–6 April 2017; pp. 328–335. [Google Scholar]
  37. Elleuchi, M.; Boujeleben, M.; Abid, M.; BenSaleh, M.S. Securing RPL-based Internet of Things applied for water pipeline monitoring. In Proceedings of the 2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 21–23 September 2017; pp. 1–7. [Google Scholar]
  38. Kallapur, P.V.; Ranjan, N.; Vidyarthi, R.; Anshuman; Singh, V. Enhanced variant of RPL for improved security. In Proceedings of the 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India, 13–16 September 2017; pp. 2302–2306. [Google Scholar]
  39. El Hajjar, A.; Roussos, G.; Paterson, M. Secure routing in IoT networks with SISLOF. In Proceedings of the 2017 Global Internet of Things Summit (GIoTS), Geneva, Switzerland, 6–9 June 2017; pp. 403–408. [Google Scholar]
  40. Kaur, G.; Saini, E.K.S. Securing network communication between motes using hierarchical group key management scheme using threshold cryptography in smart home using internet of things. In Computing and Network Sustainability; Vishwakarma, H.R., Akashe, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2017; Volume 12, pp. 201–212. [Google Scholar]
  41. Airehrour, D.; Gutierrez, J.; Ray, S.K. A testbed implementation of a trust-aware RPL routing protocol. In Proceedings of the 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, Australia, 22–24 November 2017; pp. 1–6. [Google Scholar]
  42. Ahsan, M.S.; Bhutta, M.N.M.; Maqsood, M. Wormhole attack detection in routing protocol for low power lossy networks. In Proceedings of the 2017 International Conference on Information and Communication Technologies (ICICT), Karachi, Pakistan, 30–31 December 2017; pp. 58–67. [Google Scholar]
  43. Mayzaud, A.; Badonnel, R.; Chrisment, I. A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks. IEEE Trans. Netw. Serv. Manag. 2017, 14, 472–486. [Google Scholar] [CrossRef]
  44. Gara, F.; Saad, L.B.; Ayed, R.B. An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs. In Proceedings of the 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 26–30 June 2017; pp. 276–281. [Google Scholar]
  45. Ma, G.; Li, X.; Pei, Q.; Li, Z. A security routing protocol for Internet of Things based on RPL. In Proceedings of the 2017 International Conference on Networking and Network Applications (NaNA), Kathmandu, Nepal, 16–19 October 2017; pp. 209–213. [Google Scholar]
  46. Medjek, F.; Tandjaoui, D.; Romdhani, I.; Djedjig, N. A trust-based intrusion detection system for mobile RPL based networks. In Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, UK, 21–23 June 2017; pp. 735–742. [Google Scholar]
  47. Althubaity, A.; Ji, H.; Gong, T.; Nixon, M.; Ammar, R.; Han, S. ARM: A hybrid specification-based intrusion detection system for rank attacks in 6TiSCH networks. In Proceedings of the 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Limassol, Cyprus, 12–15 September 2017; pp. 1–8. [Google Scholar]
  48. Lahbib, A.; Toumi, K.; Elleuch, S.; Laouiti, A.; Martin, S. Link reliable and trust aware RPL routing protocol for Internet of Things. In Proceedings of the 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, 30 October–1 November 2017; pp. 1–5. [Google Scholar]
  49. Pu, C.; Hajjar, S. Mitigating Forwarding misbehaviors in RPL-based low power and lossy networks. In Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 12–15 January 2018; pp. 1–6. [Google Scholar]
  50. Mehta, R.; Parmar, M.M. Trust based mechanism for securing IoT routing protocol RPL against wormhole & grayhole attacks. In Proceedings of the 3rd International Conference for Convergence in Technology (I2CT), Pune, India, 6–8 April 2018; pp. 1–6. [Google Scholar]
  51. Nikravan, M.; Movaghar, A.; Hosseinzadeh, M. A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy Networks. Wirel. Pers. Commun. 2018, 99, 1035–1059. [Google Scholar] [CrossRef]
  52. Ghaleb, B.; Al-Dubai, A.; Ekonomou, E.; Qasem, M.; Romdhani, I.; Mackenzie, L. Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Commun. Lett. 2019, 23, 68–71. [Google Scholar] [CrossRef] [Green Version]
  53. Jiang, J.; Liu, Y.; Dezfouli, B. A root-based defense mechanism against RPL blackhole attacks in internet of things networks. In Proceedings of the 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Honolulu, HI, USA, 12–15 November 2018; pp. 1194–1199. [Google Scholar]
  54. Conti, M.; Kaliyar, P.; Rabbani, M.M.; Ranise, S. SPLIT: A secure and scalable RPL routing protocol for internet of things. In Proceedings of the 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Limassol, Cyprus, 15–17 October 2018; pp. 1–8. [Google Scholar]
  55. Airehrour, D.; Gutierrez, J.A.; Ray, S.K. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Gener. Comput. Syst. 2019, 93, 860–876. [Google Scholar] [CrossRef]
  56. Arış, A.; Örs Yalçın, S.B.; Oktuğ, S.F. New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Netw. 2019, 85, 81–91. [Google Scholar] [CrossRef]
  57. Groves, B.; Pu, C. A Gini index-based countermeasure against sybil attack in the internet of things. In Proceedings of the MILCOM 2019—2019 IEEE Military Communications Conference (MILCOM), Norfolk, VA, USA, 12–14 November 2019; pp. 1–6. [Google Scholar]
  58. Bhalaji, N.; Hariharasudan, K.S.; Aashika, K. A trust based mechanism to combat blackhole attack in RPL protocol. In Proceedings of the ICICCT 2019—System Reliability, Quality Control, Safety, Maintenance and Management, Singapore, 29-30 April 2019; pp. 457–464. [Google Scholar]
  59. Choudhary, S.; Kesswani, N. Cluster-based intrusion detection method for internet of things. In Proceedings of the IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA), Abu Dhabi, UAE, 3–7 November 2019; pp. 1–8. [Google Scholar]
  60. Thulasiraman, P.; Wang, Y. A lightweight trust-based security architecture for RPL in mobile IoT networks. In Proceedings of the 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 11–14 January 2019; pp. 1–6. [Google Scholar]
  61. Yugha, R.; Chithra, S. Attribute based trust evaluation for secure RPL protocol in IoT environment. In Proceedings of the 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), Vellore, India, 30–31 March 2019; pp. 1–7. [Google Scholar]
  62. Zhang, T.; Ji, X.; Xu, W. Cuckoo-RPL: Cuckoo filter based RPL for defending AMI network from blackhole attacks. In Proceedings of the 2019 Chinese Control Conference (CCC), Guangzhou, China, 27–30 July 2019; pp. 8920–8925. [Google Scholar]
  63. Tandon, A.; Srivastava, P. Trust-based enhanced secure routing against rank and sybil attacks in IoT. In Proceedings of the Twelfth International Conference on Contemporary Computing (IC3), Noida, India, 8–10 August 2019; pp. 1–7. [Google Scholar]
  64. Verma, A.; Ranga, V. ELNIDS: Ensemble learning based network intrusion detection system for RPL based internet of things. In Proceedings of the 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India, 18–19 April 2019; pp. 1–6. [Google Scholar]
  65. Farzaneh, B.; Montazeri, M.A.; Jamali, S. An anomaly-based ids for detecting attacks in RPL-based internet of things. In Proceedings of the 5th International Conference on Web Research (ICWR), Tehran, Iran, 24–25 April 2019; pp. 61–66. [Google Scholar]
  66. Aydogan, E.; Yilmaz, S.; Sen, S.; Butun, I.; Forsström, S.; Gidlund, M. A central intrusion detection system for RPL-based industrial internet of things. In Proceedings of the 15th IEEE International Workshop on Factory Communication Systems (WFCS), Sundsvall, Sweden, 27–29 May 2019; pp. 1–5. [Google Scholar]
  67. Fatima tuz, Z.; Jhanjhi, N.; Brohi, S.N.; Malik, N.A. Proposing a rank and wormhole attack detection framework using machine learning. In Proceedings of the 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), Karachi, Pakistan, 14–15 December 2019; pp. 1–9. [Google Scholar]
  68. Taghanaki, S.R.; Jamshidi, K.; Bohlooli, A. DEEM: A Decentralized and energy efficient method for detecting sinkhole attacks on the internet of things. In Proceedings of the 2019 9th International Conference on Computer and Knowledge Engineering (ICCKE), Mashhad, Iran, 24–25 October 2019; pp. 325–330. [Google Scholar]
  69. Patel, H.B.; Jinwala, D.C. Blackhole detection in 6LoWPAN based internet of things: An anomaly based approach. In Proceedings of the TENCON 2019—2019 IEEE Region 10 Conference (TENCON), Kochi, India, 17–20 October 2019; pp. 947–954. [Google Scholar]
  70. Soni, G.; Sudhakar, R. A L-IDS against dropping attack to secure and improve RPL performance in WSN aided IoT. In Proceedings of the 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 27–28 February 2020; pp. 377–383. [Google Scholar]
  71. Zaminkar, M.; Fotohi, R. SoS-RPL: Securing Internet of Things against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism. Wirel. Pers. Commun. 2020. [Google Scholar] [CrossRef]
  72. Hashemi, S.Y.; Aliee, F.S. Fuzzy, Dynamic and Trust Based Routing Protocol for IoT. J. Netw. Syst. Manag. 2020. [Google Scholar] [CrossRef]
  73. Djedjig, N.; Tandjaoui, D.; Medjek, F.; Romdhani, I. Trust-aware and cooperative routing protocol for IoT security. J. Inf. Secur. Appl. 2020, 52, 102467. [Google Scholar] [CrossRef]
  74. Murali, S.; Jamalipour, A. A Lightweight Intrusion Detection for Sybil Attack under Mobile RPL in the Internet of Things. IEEE Internet Things J. 2020, 7, 379–388. [Google Scholar] [CrossRef]
  75. Team, R. RStudio: Integrated Development for R; RStudio, Inc.: Boston, MA, USA, 2015; Volume 42, p. 14. Available online: http://www.rstudio.com (accessed on 8 September 2020).
Figure 1. Internet of things (IoT) architecture [7,8,10].
Figure 1. Internet of things (IoT) architecture [7,8,10].
Applsci 10 06472 g001
Figure 2. Approach coding.
Figure 2. Approach coding.
Applsci 10 06472 g002
Figure 3. (a) Annual scientific production. (b) Themes by year.
Figure 3. (a) Annual scientific production. (b) Themes by year.
Applsci 10 06472 g003
Figure 4. Most productive authors.
Figure 4. Most productive authors.
Applsci 10 06472 g004
Figure 5. Most productive countries.
Figure 5. Most productive countries.
Applsci 10 06472 g005
Figure 6. Most Productive Countries in the Map.
Figure 6. Most Productive Countries in the Map.
Applsci 10 06472 g006
Figure 7. Keyword co-occurrences.
Figure 7. Keyword co-occurrences.
Applsci 10 06472 g007
Figure 8. Numbers to theme codes by proposal.
Figure 8. Numbers to theme codes by proposal.
Applsci 10 06472 g008
Figure 9. Correlation between mitigated attacks.
Figure 9. Correlation between mitigated attacks.
Applsci 10 06472 g009
Table 1. Attack coding.
Table 1. Attack coding.
AttackOccurs When?ConsequencesCoding
Rank attackThis attack happens when malicious nodes send information a lower range, simulating closer than others to the root. This situation allows, as a consequence, malicious nodes to capture as much traffic as possible [15,16].In this attack, an attacker can decrease the network performance in terms of delay and packet delivery rate and this leads to suboptimal routes, especially when the attacking node location is in a high forward load area [17].RA
Blackhole attackIt is carried out by a malicious node so that all the traffic that passes through it disappears discretely, thus isolating part of the network [15].This attack isolates part of the network, eliminating all the messages that reach it. Its impact is highly negative since data from a subnet is wholly lost. The closer the malicious node is to the tree’s root, the larger the subnet from which data is lost.BA
Selective forwarding attackThis is a particular case of the BA, in which some packets (data or control messages) are deleted, while others are successfully forwarded, interrupting the routing process and affecting the efficiency of the network [15].This attack isolates part of the network like the BA, but to a lesser extent since it does not delete all the messages it receives, but only a part of them. Its impact lies in the loss of data that depends on the percentage of packets that the malicious node has decided to discard.SFA
Wormhole attackThis attack usually involves two or more attackers in the network, and attackers use a high-bandwidth tunnel in the network. These tunnels are advertised as high-quality routes by the attackers [18].This attack attracts network traffic to a tunnel that is attractive for its bandwidth, generating consequences of traffic diversion and possible theft of sensitive data.WA
DODAG version number attackThe DODAG version number is the same during the DODAG creation. When this number changes, the RPL protocol triggers a global repair mechanism of the DODAG. This type of attack consumes network resources, decreasing node lifetime as nodes use precious resources to repair the DODAG [19].Its most significant impact is focused on reducing the lifetime of the network since the nodes spend energy rebuilding the network topology unnecessarily as a consequence of the attack executed.DA
DAO inconsistency attackIn this attack, a malicious node intentionally drops the received packets and sets the forwarding-error flag in the packet option header to create the forwarding error packet, and then replies with the forwarding error packet to cause the parent node to discard valid downward routes in the routing table [20].This attack modifies the control message through which a node selects a parent node. Consequently, valid routes are eliminated or discarded that can, for example, reduce the number of hops that take the sending of a packet from an origin to its destiny.DAA
DIO suppression attackThis attack induces victim nodes to suppress the transmission of DIO messages needed to build the routing topology [21].This attack eliminates the control message through which the topology’s construction and maintenance are carried out when eliminating these messages. The construction of an incomplete tree, or even the no-construction of the tree, will result, making it impossible to put network running.DIA
Sybil attackIn this attack, nodes pretend to be more than one node simultaneously in this attack [22]As a consequence of this attack, there is a possible theft of data, since an illegitimate node tries to take the identity a legitimate node with the possible intention of forwarding the traffic to another place. If the data is sensitive, this could have inclusive legal consequences.SYA
Sinkhole attackThe adversary node tries to attract most of the traffic, thus controlling most of the data moving through the network. For this purpose, the attacker must appear before others as “very attractive” when presenting optimal routes [15]This attack has the same consequences as the RA attack, since its objective is the same, appearing attractive to other nodes, being part of the possible routes, and receiving most of the captured data.SIA
Table 2. Results by databases.
Table 2. Results by databases.
Query/DatabaseIEEEScience DirectSpringer
Step 2Step 3Step 2Step 3Step 2Step 3
((((“All Metadata”: security) AND “All Metadata”: routing) AND “All Metadata”: rpl) NOT “All Metadata”: review)13143--------
Title, abstract, keywords: RPL based secure and RPL secure and authentication protocol and Security Routing Based RPL----1474----
‘rpl AND based AND secure AND and AND rpl AND secure AND and AND authentication AND protocol AND and AND Security AND Routing AND Based AND RPL’.--------1816
Table 3. Conferences, journals and books coding.
Table 3. Conferences, journals and books coding.
TypeTitleCode
Conferences2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor SystemsEIAD
2016 IEEE Global Communications Conference (GLOBECOM)GLOBECOM
2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)SoftCOM
2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)WiSPNET
2011 IFIP Wireless Days (WD)WD
2014 11th International Symposium on Wireless Communications Systems (ISWCS)ISWCS
2015 21st Asia-Pacific Conference on Communications (APCC)APCC
2017 8th International Conference on Information and Communication Systems (ICICS)ICICS
2017 International Conference on Advances in Computing, Communications, and Informatics (ICACCI)ICACCI
2017 Global Internet of Things Summit (GIoTS)GIoTS
2015 IEEE Symposium on Computers and Communication (ISCC)ISCC
Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013)CNSM
Interoperability, Safety, and Security in IoTISSIOT
Computing and Network SustainabilityCNS
2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)IWCMC
2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)CCNC8
2017 International Conference on Networking and Network Applications (NaNA)NaNA
2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN)ICUFN
2016 26th International Telecommunication Networks and Applications Conference (ITNAC)ITNAC6
2017 27th International Telecommunication Networks and Applications Conference (ITNAC)ITNAC7
2018 3rd International Conference for Convergence in Technology (I2CT)I2CT
2017 International Conference on Information and Communication Technologies (ICICT)ICICT
2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)CCWC
2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)ICIOT
MILCOM 2019–2019 IEEE Military Communications Conference (MILCOM)MILCOM
2020 7th International Conference on Signal Processing and Integrated Networks (SPIN)SPIN
International Conference on Intelligent Computing and Communication TechnologiesICICCT
2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)ERFA
2017 IEEE 16th International Symposium on Network Computing and Applications (NCA)NCA
2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)WIMOB
2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)APSIPA
2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN)VITECON
2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)AICCSA
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)CCNC9
2019 Chinese Control Conference (CCC)CCC
2019 Twelfth International Conference on Contemporary Computing (IC3)IC3
2019 4th International conference on Internet of Things: Smart innovation and usages (IoT-SIU)SIU
2019 15th IEEE International Workshop on Factory Communication Systems (WFCS)WFCS
2019 5th International Conference on Web Research (ICWR)ICWR
2019 International Conference on Computing, Networking and Communications (ICNC)ICNC
2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS)MACS
2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)ICCKE
TENCON 2019–2019 IEEE Region 10 Conference (TENCON)TENCON
JournalsWireless Personal CommunicationsWPC
Ad Hoc NetworksAND
IEEE Transactions on Network and Service ManagementTNSM
IEEE Communications LettersICL
Future Generation Computer SystemsFGCS
Ad Hoc NetworksADH
Journal Of Network And Systems ManagementJNSM
Journal of Information Security and ApplicationsJISA
IEEE Internet of Things JournalITJ
Table 4. Type of paper coding.
Table 4. Type of paper coding.
Type of PaperCode
Conference paper (proceedings)CP
Journal paperJP
Table 5. Theme coding.
Table 5. Theme coding.
ThemeCode
Rank attack/Sinkhole attackRSA
Selective forwarding/Blackhole attackSBA
Wormhole attackWA
DOGAG number version attackDNA
DAO/DIS message inconsistency attackD2A
Sybil attackSA
Table 6. Approach coding: presents the mechanisms or strategies used by the authors to mitigate the attacks.
Table 6. Approach coding: presents the mechanisms or strategies used by the authors to mitigate the attacks.
Type of ApproachCode
Based on authentication or cryptographyAC
Based on network monitoringNM
Based on secure parent node selectionSP
OtherOT
Table 7. Paper classification.
Table 7. Paper classification.
AuthorsCitedType CodeJ/C/CodeTheme CodeApproach CodingReference
RSASBAWADNAD2ASAACNMSPOT
Dvir, A et al. (2011)128CPEIADX X X [27]
Le, A et al. (2011)73CPWDX X [28]
Raza, S et al. (2013)512JPANDX X X [29]
Khan, Faraz et al. (2013) 30CPICUFN X X [18]
Seeber, Sebastian et al. (2013)27CPCNSMXXX X [30]
Matsunaga, T et al. (2014)11CPISWCSX X [31]
Iuchi, K et al. (2015)18CPAPCCX X [32]
Djedjig, N et al. (2015)29CPISCCX X [33]
El Hajjar, Ayman et al. (2016) 2CPISSIOTXXX X [34]
Nan, Jiang et al. (2016)3CPWiSPNETXX X [19]
Airehrour, D et al. (2016)31CPITNAC6 X X [35]
Glissa, G et al. (2016)39CPGLOBECOMXXX X [15]
Djedjig, N et al. (2017)27CPICICSX X [36]
Elleuchi, M et al. (2017)5CPSoftCOMX X XXX [37]
Kallapur, P et al. (2017)2CPICACCIX X [38]
El Hajjar, Ayman et al. (2017) 2CPGIoTSXX X [39]
Kaur, Gagandeep et al. (2017) 1CPCNSXXX X [40]
Airehrour, D et al. (2017)5CPITNAC7 X X [41]
Ahsan, M et al. (2017)6CPICICT X X[42]
Mayzaud, A et al. (2017)25JPTNSM X X [43]
Gara, F et al. (2017)9CPIWCMCXX X [44]
Ma, G et al. (2017)7CPNaNA X X[45]
Medjek, F et al. (2017)8CPICIOT X X [46]
Althubaity, A et al. (2017)3CPERFAX X [47]
Lahbib, A et al. (2017)6CPNCA X X [48]
Pu, C et al. (2018)23CPCCNC8XX X [49]
Mehta, R et al. (2018)3CPI2CT X X [50]
Nikravan, M et al. (2018)6JPWPCX X X [51]
Pu, C (2018)13CPCCWC X X [20]
Nikam, A et al. (2018)3CPI2CT X X [22]
Ghaleb et al. (2018) 13JPICL X X[52]
Jiang, J et al. (2018)2CPAPSIPA X X [53]
Conti, M et al. (2018)15CPWIMOB X X[54]
Airehrour et al. (2019) 44JPFGCS X X [55]
A Arış et al. (2019) 6JPADH X X [56]
Groves et al. (2019) 2CPMILCOM X X [57]
N Bhalaji et al. (2019) 2CPICICCT X X [58]
S. Choudhary et al. (2019)0CPAICCSAXX X [59]
Thulasiraman, P et al. (2019)9CPCCNC9 X X [60]
Yugha, R et al. (2019)1CPVITECON X X [61]
Zhang, T et al. (2019)2CPCCC X X [62]
Tandon, A et al. (2019)2CPIC3X X X [63]
Verma, A et al. (2019)8CPSIUXX X X[64]
Farzaneh, B et al. (2019)8CPICWR X X [65]
Aydogan, E et al. (2019)8CPWFCS X X[66]
Jhanjhi, NZ et al. (2019)2CPMACSX X X [67]
Taghanaki, S et al. (2019)0CPICCKEX X [68]
Patel, H et al. (2019)2CPTENCON X X [69]
G Soni et al. (2020) 0CPSPIN X X [70]
Zaminkar Mina et al. (2020) 0JPWPCX X [71]
Hashemi et al. (2020) 0JPJNSMXX X X [72]
Djedjig et al. (2020) 1JPJISAXX X [73]
S. Murali et al. (2020)6JPITJ X X [74]
Table 8. Main information about data.
Table 8. Main information about data.
DescriptionValue
Number of Documents53
Keywords Plus106
Authors Keywords144
Period2011–2020
Average citations per documents22.45
Authors142
Authors appearances169
Authors single-authored documents1
Documents per author0.373
Authors per document2.68
Co-authors per documents3.19
Collaboration index2.71
Conferences proceedings43
Journal paper10
Table 9. Paper approach.
Table 9. Paper approach.
Approach CodeValuePercent
AC1223
NM1630
SP1936
OT611
Table 10. Main Authors and Publication Years.
Table 10. Main Authors and Publication Years.
AuthorPeriodReference
Matsunaga T2014–2015[31,32]
El Hajjar A2017[34,39]
Pu C2018–2019[20,49,57]
Ray SK2016–2019[35,41,55]
Gutierrez J2016–2019[35,41,55]
Airehrour D2016–2019[35,41,55]
Romdhani I2017–2020[36,46,52,73]
Tandjaoui D2015–2020[34,36,46,73]
Medjek F2015–2020[34,36,46,73]
Djedjig N2015–2020[34,36,46,73]

Share and Cite

MDPI and ACS Style

Avila, K.; Jabba, D.; Gomez, J. Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT. Appl. Sci. 2020, 10, 6472. https://doi.org/10.3390/app10186472

AMA Style

Avila K, Jabba D, Gomez J. Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT. Applied Sciences. 2020; 10(18):6472. https://doi.org/10.3390/app10186472

Chicago/Turabian Style

Avila, Karen, Daladier Jabba, and Javier Gomez. 2020. "Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT" Applied Sciences 10, no. 18: 6472. https://doi.org/10.3390/app10186472

APA Style

Avila, K., Jabba, D., & Gomez, J. (2020). Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT. Applied Sciences, 10(18), 6472. https://doi.org/10.3390/app10186472

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop