Literature DB >> 35591090

A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things.

Taief Alaa Al-Amiedy1, Mohammed Anbar1, Bahari Belaton2, Arkan Hammoodi Hasan Kabla1, Iznan H Hasbullah1, Ziyad R Alashhab1.   

Abstract

The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources of 6LoWPAN nodes make it challenging to secure the environment, leaving it vulnerable to threats and security attacks. Machine Learning (ML) and Deep Learning (DL) approaches have shown promise as effective and efficient mechanisms for detecting anomalous behaviors in RPL-based 6LoWPAN. Therefore, this paper systematically reviews and critically analyzes the research landscape on ML, DL, and combined ML-DL approaches applied to detect attacks in RPL networks. In addition, this study examined existing datasets designed explicitly for the RPL network. This work collects relevant studies from five major databases: Google Scholar, Springer Link, Scopus, Science Direct, and IEEE Xplore® digital library. Furthermore, 15,543 studies, retrieved from January 2016 to mid-2021, were refined according to the assigned inclusion criteria and designed research questions resulting in 49 studies. Finally, a conclusive discussion highlights the issues and challenges in the existing studies and proposes several future research directions.

Entities:  

Keywords:  6LoWPAN; Deep Learning (DL); IPv6; Internet of Thing (IoT); Low Power and Lossy Network (LLN); Machine Learning (ML); RPL security and threats; Systematic Literature Review (SLR)

Mesh:

Year:  2022        PMID: 35591090      PMCID: PMC9101018          DOI: 10.3390/s22093400

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


  7 in total

1.  Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things.

Authors:  Geethapriya Thamilarasu; Shiven Chawla
Journal:  Sensors (Basel)       Date:  2019-04-27       Impact factor: 3.576

2.  Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks.

Authors:  Ismael Essop; José C Ribeiro; Maria Papaioannou; Georgios Zachos; Georgios Mantas; Jonathan Rodriguez
Journal:  Sensors (Basel)       Date:  2021-02-23       Impact factor: 3.576

3.  Efficient Anomaly Detection for Smart Hospital IoT Systems.

Authors:  Abdel Mlak Said; Aymen Yahyaoui; Takoua Abdellatif
Journal:  Sensors (Basel)       Date:  2021-02-03       Impact factor: 3.576

4.  Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement.

Authors:  David Moher; Alessandro Liberati; Jennifer Tetzlaff; Douglas G Altman
Journal:  PLoS Med       Date:  2009-07-21       Impact factor: 11.069

5.  A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT.

Authors:  Carlos D Morales-Molina; Aldo Hernandez-Suarez; Gabriel Sanchez-Perez; Linda K Toscano-Medina; Hector Perez-Meana; Jesus Olivares-Mercado; Jose Portillo-Portillo; Victor Sanchez; Luis Javier Garcia-Villalba
Journal:  Sensors (Basel)       Date:  2021-05-03       Impact factor: 3.576

  7 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.