2023
DOI: 10.1109/access.2023.3246180
|View full text |Cite
|
Sign up to set email alerts
|

A Review on the Security of IoT Networks: From Network Layer’s Perspective

Abstract: Internet of Things (IoT) has revolutionized the world in the last decade. Today millions of devices are connected to each other utilizing IoT technology in one way or the other. With the significant growth in IoT devices, the provision of IoT security is imperative. Routing protocol for low power and lossy networks (RPL) is a network layer protocol, specially designed for routing in IoT devices. RPL protocol faces many attacks such as selective forwarding attacks, blackhole attacks, sybil attacks, wormhole att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 80 publications
0
15
0
Order By: Relevance
“…While rule-based detection engines are a strong foundation for security businesses, cyber threat hunting is a crucial skill to have to detect undisclosed advanced threats. In contrast to rule-based detection approaches, hunting identifies and investigates risks proactively [11]. Cyber threat hunting is a proactive eye into the entire network to keep focused on the networks and endpoint to hunt malicious, suspicious, or any risky activity that has detection by existing tools.…”
Section: B Problem Evolutionmentioning
confidence: 99%
“…While rule-based detection engines are a strong foundation for security businesses, cyber threat hunting is a crucial skill to have to detect undisclosed advanced threats. In contrast to rule-based detection approaches, hunting identifies and investigates risks proactively [11]. Cyber threat hunting is a proactive eye into the entire network to keep focused on the networks and endpoint to hunt malicious, suspicious, or any risky activity that has detection by existing tools.…”
Section: B Problem Evolutionmentioning
confidence: 99%
“…The RPL as a widely deployed routing protocol in IoT is susceptible to routing attacks such as DIS-flooding, sinkhole, rank, and worst parent attacks to name a few. Routing attacks pose a great threat to IoT running RPL as a routing protocol; and may affect its performance and functionalities [11].…”
Section: Figure 1 Applications Of the Internet Of Thingsmentioning
confidence: 99%
“…Security is one of the most critical challenges of IoT and especially of IoMT, which deals with patients' and individuals' vital, sensitive and private information. The problems and solutions in this region can be classified as confidentiality and key management, authentication and access control, anonymity and privacy-preserving, and intrusion detection systems [10], [11]. Considering the resource constraint of IoT devices, the efficiency of using resources in these solutions becomes a necessary condition.…”
Section: A Main Motivationmentioning
confidence: 99%
“…• By the above information, the attacker can perform all computations of Algorithm 2, at steps ( 6) and ( 7) and calculate N s1 . Finally, by eavesdropping on M 1.3 at step (9) of Algorithm 2 and performing the computations of step (10), the shared key K ws is disclosed.…”
Section: ) Eavesdropping Attackmentioning
confidence: 99%