Cargando…
A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources of 6LoWPAN nodes make it challenging to secur...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9101018/ https://www.ncbi.nlm.nih.gov/pubmed/35591090 http://dx.doi.org/10.3390/s22093400 |
_version_ | 1784706982685442048 |
---|---|
author | Al-Amiedy, Taief Alaa Anbar, Mohammed Belaton, Bahari Kabla, Arkan Hammoodi Hasan Hasbullah, Iznan H. Alashhab, Ziyad R. |
author_facet | Al-Amiedy, Taief Alaa Anbar, Mohammed Belaton, Bahari Kabla, Arkan Hammoodi Hasan Hasbullah, Iznan H. Alashhab, Ziyad R. |
author_sort | Al-Amiedy, Taief Alaa |
collection | PubMed |
description | The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources of 6LoWPAN nodes make it challenging to secure the environment, leaving it vulnerable to threats and security attacks. Machine Learning (ML) and Deep Learning (DL) approaches have shown promise as effective and efficient mechanisms for detecting anomalous behaviors in RPL-based 6LoWPAN. Therefore, this paper systematically reviews and critically analyzes the research landscape on ML, DL, and combined ML-DL approaches applied to detect attacks in RPL networks. In addition, this study examined existing datasets designed explicitly for the RPL network. This work collects relevant studies from five major databases: Google Scholar, Springer Link, Scopus, Science Direct, and IEEE Xplore(®) digital library. Furthermore, 15,543 studies, retrieved from January 2016 to mid-2021, were refined according to the assigned inclusion criteria and designed research questions resulting in 49 studies. Finally, a conclusive discussion highlights the issues and challenges in the existing studies and proposes several future research directions. |
format | Online Article Text |
id | pubmed-9101018 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-91010182022-05-14 A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things Al-Amiedy, Taief Alaa Anbar, Mohammed Belaton, Bahari Kabla, Arkan Hammoodi Hasan Hasbullah, Iznan H. Alashhab, Ziyad R. Sensors (Basel) Review The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources of 6LoWPAN nodes make it challenging to secure the environment, leaving it vulnerable to threats and security attacks. Machine Learning (ML) and Deep Learning (DL) approaches have shown promise as effective and efficient mechanisms for detecting anomalous behaviors in RPL-based 6LoWPAN. Therefore, this paper systematically reviews and critically analyzes the research landscape on ML, DL, and combined ML-DL approaches applied to detect attacks in RPL networks. In addition, this study examined existing datasets designed explicitly for the RPL network. This work collects relevant studies from five major databases: Google Scholar, Springer Link, Scopus, Science Direct, and IEEE Xplore(®) digital library. Furthermore, 15,543 studies, retrieved from January 2016 to mid-2021, were refined according to the assigned inclusion criteria and designed research questions resulting in 49 studies. Finally, a conclusive discussion highlights the issues and challenges in the existing studies and proposes several future research directions. MDPI 2022-04-29 /pmc/articles/PMC9101018/ /pubmed/35591090 http://dx.doi.org/10.3390/s22093400 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Al-Amiedy, Taief Alaa Anbar, Mohammed Belaton, Bahari Kabla, Arkan Hammoodi Hasan Hasbullah, Iznan H. Alashhab, Ziyad R. A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things |
title | A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things |
title_full | A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things |
title_fullStr | A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things |
title_full_unstemmed | A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things |
title_short | A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things |
title_sort | systematic literature review on machine and deep learning approaches for detecting attacks in rpl-based 6lowpan of internet of things |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9101018/ https://www.ncbi.nlm.nih.gov/pubmed/35591090 http://dx.doi.org/10.3390/s22093400 |
work_keys_str_mv | AT alamiedytaiefalaa asystematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings AT anbarmohammed asystematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings AT belatonbahari asystematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings AT kablaarkanhammoodihasan asystematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings AT hasbullahiznanh asystematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings AT alashhabziyadr asystematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings AT alamiedytaiefalaa systematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings AT anbarmohammed systematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings AT belatonbahari systematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings AT kablaarkanhammoodihasan systematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings AT hasbullahiznanh systematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings AT alashhabziyadr systematicliteraturereviewonmachineanddeeplearningapproachesfordetectingattacksinrplbased6lowpanofinternetofthings |