Redirigiendo al acceso original de articulo en 22 segundos...
Inicio  /  Applied Sciences  /  Vol: 10 Par: 18 (2020)  /  Artículo
ARTÍCULO
TITULO

Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT

Karen Avila    
Daladier Jabba and Javier Gomez    

Resumen

The Internet of things (IoT) is a concept that has gained traction over the last decade. IoT networks have evolved around the wireless sensor network (WSN), and the following research looks at relevant IoT concepts and the different security issues that occur specifically at the network layer. This analysis is performed using a structured literature review (SLR). This form of bibliographic review has been a trend in recent years. Its strength is the performance of a bibliometric analysis that allows studying both trends in the line of research that you want to address and the relevant authors. This SLR reviews 53 proposals between 2011 and 2020, whose contribution is to mitigate attacks in the RPL (Routing Protocol for Low-Power and Lossy Networks) protocol. The revised proposals emerged after selecting keywords and databases in which to apply the search. Initially, approximately 380 research works appeared, for which it was necessary to continue using filters to refine the proposals to be included. After reading titles and abstracts, 53 papers were finally selected. In addition to analyzing the attacks mitigated in the RPL protocol, it is intended to identify the trend by which these attacks are reduced, as a result of the review, nine attacks have been found: rank, blackhole, selective forwarding, wormhole, DODAG (Destination-Oriented Directed Acyclic Graph) version number, DAO (Destination Advertisement Object) inconsistency, DIO (DODAG Information Object) suppression, Sybil, and sinkhole. Each of the 53 proposals analyzed in this review has an associated mitigation strategy, these strategies have been categorized into four groups, based on authentication or cryptography, based on network monitoring, based on secure parent node selection and other. According to the results, the authors? primary mitigation strategy is based on network monitoring, with 30%. This review also identifies the principal authors and countries that need the development of this line of research.

 Artículos similares

       
 
Peiyue Li and Jianhua Wu    
This editorial introduces the Special Issue titled ?Water Resources and Sustainable Development,? underscoring the critical need for sustainable management of water resources in light of increasing demand, climate change impacts, and pollution. The issue... ver más
Revista: Water

 
Darja Cirjulina, Ruslans Babajans, Filips Capligins, Deniss Kolosovs and Anna Litvinenko    
This manuscript presents an experimental study of Quadrature Chaos Shift Keying (QCSK) as a means to tighten the physical layer security of Internet of Things (IoT) communication. Our study examines the characteristics and operational aspects of chaos os... ver más
Revista: Applied Sciences

 
Sabina Szymoniak, Filip Depta, Lukasz Karbowiak and Mariusz Kubanek    
Artificial Intelligence is an indispensable element of the modern world, constantly evolving and contributing to the emergence of new technologies. We meet it in everyday applications, primarily using intelligent systems that aim to improve our lives. Ar... ver más
Revista: Applied Sciences

 
Leyla Gamidullaeva, Alexey Finogeev, Mikhail Kataev and Larisa Bulysheva    
Despite of tourism infrastructure and software, the development of tourism is hampered due to the lack of information support, which encapsulates various aspects of travel implementation. This paper highlights a demand for integrating various approaches ... ver más
Revista: Algorithms

 
Maoli Wang, Yu Sun, Hongtao Sun and Bowen Zhang    
The Industrial Internet of Things (IIoT), where numerous smart devices associated with sensors, actuators, computers, and people communicate with shared networks, has gained advantages in many fields, such as smart manufacturing, intelligent transportati... ver más
Revista: Computers