Cargando…

A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things

The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources of 6LoWPAN nodes make it challenging to secur...

Descripción completa

Detalles Bibliográficos
Autores principales: Al-Amiedy, Taief Alaa, Anbar, Mohammed, Belaton, Bahari, Kabla, Arkan Hammoodi Hasan, Hasbullah, Iznan H., Alashhab, Ziyad R.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9101018/
https://www.ncbi.nlm.nih.gov/pubmed/35591090
http://dx.doi.org/10.3390/s22093400
_version_ 1784706982685442048
author Al-Amiedy, Taief Alaa
Anbar, Mohammed
Belaton, Bahari
Kabla, Arkan Hammoodi Hasan
Hasbullah, Iznan H.
Alashhab, Ziyad R.
author_facet Al-Amiedy, Taief Alaa
Anbar, Mohammed
Belaton, Bahari
Kabla, Arkan Hammoodi Hasan
Hasbullah, Iznan H.
Alashhab, Ziyad R.
author_sort Al-Amiedy, Taief Alaa
collection PubMed
description The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources of 6LoWPAN nodes make it challenging to secure the environment, leaving it vulnerable to threats and security attacks. Machine Learning (ML) and Deep Learning (DL) approaches have shown promise as effective and efficient mechanisms for detecting anomalous behaviors in RPL-based 6LoWPAN. Therefore, this paper systematically reviews and critically analyzes the research landscape on ML, DL, and combined ML-DL approaches applied to detect attacks in RPL networks. In addition, this study examined existing datasets designed explicitly for the RPL network. This work collects relevant studies from five major databases: Google Scholar, Springer Link, Scopus, Science Direct, and IEEE Xplore(®) digital library. Furthermore, 15,543 studies, retrieved from January 2016 to mid-2021, were refined according to the assigned inclusion criteria and designed research questions resulting in 49 studies. Finally, a conclusive discussion highlights the issues and challenges in the existing studies and proposes several future research directions.
format Online
Article
Text
id pubmed-9101018
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-91010182022-05-14 A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things Al-Amiedy, Taief Alaa Anbar, Mohammed Belaton, Bahari Kabla, Arkan Hammoodi Hasan Hasbullah, Iznan H. Alashhab, Ziyad R. Sensors (Basel) Review The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources of 6LoWPAN nodes make it challenging to secure the environment, leaving it vulnerable to threats and security attacks. Machine Learning (ML) and Deep Learning (DL) approaches have shown promise as effective and efficient mechanisms for detecting anomalous behaviors in RPL-based 6LoWPAN. Therefore, this paper systematically reviews and critically analyzes the research landscape on ML, DL, and combined ML-DL approaches applied to detect attacks in RPL networks. In addition, this study examined existing datasets designed explicitly for the RPL network. This work collects relevant studies from five major databases: Google Scholar, Springer Link, Scopus, Science Direct, and IEEE Xplore(®) digital library. Furthermore, 15,543 studies, retrieved from January 2016 to mid-2021, were refined according to the assigned inclusion criteria and designed research questions resulting in 49 studies. Finally, a conclusive discussion highlights the issues and challenges in the existing studies and proposes several future research directions. MDPI 2022-04-29 /pmc/articles/PMC9101018/ /pubmed/35591090 http://dx.doi.org/10.3390/s22093400 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Al-Amiedy, Taief Alaa
Anbar, Mohammed
Belaton, Bahari
Kabla, Arkan Hammoodi Hasan
Hasbullah, Iznan H.
Alashhab, Ziyad R.
A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things
title A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things
title_full A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things
title_fullStr A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things
title_full_unstemmed A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things
title_short A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things
title_sort systematic literature review on machine and deep learning approaches for detecting attacks in rpl-based 6lowpan of internet of things
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9101018/
https://www.ncbi.nlm.nih.gov/pubmed/35591090
http://dx.doi.org/10.3390/s22093400
work_keys_str_mv AT alamiedytaiefalaa asystematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings
AT anbarmohammed asystematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings
AT belatonbahari asystematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings
AT kablaarkanhammoodihasan asystematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings
AT hasbullahiznanh asystematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings
AT alashhabziyadr asystematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings
AT alamiedytaiefalaa systematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings
AT anbarmohammed systematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings
AT belatonbahari systematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings
AT kablaarkanhammoodihasan systematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings
AT hasbullahiznanh systematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings
AT alashhabziyadr systematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings