Blackhole attacks in internet of things networks: A review

The internet of things (IoT) is one of data revolution area and is the following extraordinary mechanical jump after the internet. In terms of IoT, it is expected that electronic gadgets that are used on a regular basis would be connected to the current of the internet. IPv6 over low-power wireless...

Full description

Saved in:
Bibliographic Details
Main Authors: S. M. M Yassin, S. M. Warusia Mohamed, Kamis, Noor Hisham, Abdollah, Mohd Faizal, Abdul Razak, Siti Fatimah, Yogarayan, Sumendra
Format: Article
Language:English
Published: Institute Of Advanced Engineering And Science (IAES) 2023
Online Access:http://eprints.utem.edu.my/id/eprint/27448/2/0103631102023.PDF
http://eprints.utem.edu.my/id/eprint/27448/
https://ijeecs.iaescore.com/index.php/IJEECS/article/view/29769
http://doi.org/10.11591/ijeecs.v30.i2.pp1080-1090
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The internet of things (IoT) is one of data revolution area and is the following extraordinary mechanical jump after the internet. In terms of IoT, it is expected that electronic gadgets that are used on a regular basis would be connected to the current of the internet. IPv6 over low-power wireless personal area networks (6LoWPAN) is a one of IPv6 header pressure technology, and accordingly, it is vulnerable to attack. The IoT is a combination of devices with restricted resource assets like memory, battery power, and computational capability. To solve this, RPL or routing protocol for low power Lossy network is deploy by utilizing a distance vector scheme. One of denial of service (Dos) attack to RPL network is blackhole attack in which the assailant endeavors to become a parent by drawing in a critical volume of traffic to it and drop all packets. In this paper, we discuss research on numerous attacks and current protection methods, focusing on the blackhole attack. There is also discussion of challenge, open research issues and future perspectives in RPL security. Furthermore, research on blackhole attacks and specific detection technique proposed in the literature is also been presented.