2022
DOI: 10.3390/s22093400
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things

Abstract: The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources of 6LoWPAN nodes make it challenging to secure the environment, leaving it vulnerable to threats and security attacks. Machine Learning (ML) and Deep Learning (DL) approaches have shown promise as effective and efficient mechanisms for detecting anomalous beha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 38 publications
(16 citation statements)
references
References 81 publications
0
11
0
Order By: Relevance
“…Another reason for resorting to a private dataset is the flexibility to evaluate their approaches in various scenarios. Finally, since there are no standards or criteria to set up the network environment and visualize the simulation scenarios, it is harder for researchers to compare their proposed approach with others [129]. Figure 15 shows two primary dataset types used by researchers.…”
Section: Rq(5) What Datasets Are Used To Evaluate and Validate The Ex...mentioning
confidence: 99%
See 1 more Smart Citation
“…Another reason for resorting to a private dataset is the flexibility to evaluate their approaches in various scenarios. Finally, since there are no standards or criteria to set up the network environment and visualize the simulation scenarios, it is harder for researchers to compare their proposed approach with others [129]. Figure 15 shows two primary dataset types used by researchers.…”
Section: Rq(5) What Datasets Are Used To Evaluate and Validate The Ex...mentioning
confidence: 99%
“…Finally, some researchers contribute realistic synthetic datasets by publicly making them available[126,130,131]. The variety of datasets utilized results in the research community finding it challenging to compare their works with others[129]. Therefore, the availability of a realistic SDN dataset remains an open research challenge that needs addressing.•Distributed SDN controllers: This SLR remarked that the security approaches proposed in most literature studies are based on a topology with a single network controller, such as[69,75,77,86,113].…”
mentioning
confidence: 99%
“…The network layer defines paths for the routing of data over the network. It has been demonstrated that low-power wireless networks with multiple hops are susceptible to a wide range of attacks, with routing attacks emerging as one of the most significant threats in the healthcare IoT environment [203]. There are many types of routing attacks, including selective forwarding attacks and replay attacks [204].…”
Section: Routing Attack and Network Layermentioning
confidence: 99%
“…The industrial sector is one of the highly privileged application areas of RPL, as the limited availability of resources and frequent communication breakages are crucial concerns in the industrial environment. RPL is a potential choice for coping with such emerging challenges in the industrial sector [ 14 , 15 , 16 ]. The expanding range of RPL applications in industrial sectors clearly shows its efficiency.…”
Section: Introductionmentioning
confidence: 99%