Blackhole attacks in internet of things networks: A review
The internet of things (IoT) is one of data revolution area and is the following extraordinary mechanical jump after the internet. In terms of IoT, it is expected that electronic gadgets that are used on a regular basis would be connected to the current of the internet. IPv6 over low-power wireless...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute Of Advanced Engineering And Science (IAES)
2023
|
Online Access: | http://eprints.utem.edu.my/id/eprint/27448/2/0103631102023.PDF http://eprints.utem.edu.my/id/eprint/27448/ https://ijeecs.iaescore.com/index.php/IJEECS/article/view/29769 http://doi.org/10.11591/ijeecs.v30.i2.pp1080-1090 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utem.eprints.27448 |
---|---|
record_format |
eprints |
spelling |
my.utem.eprints.274482024-07-11T13:07:21Z http://eprints.utem.edu.my/id/eprint/27448/ Blackhole attacks in internet of things networks: A review S. M. M Yassin, S. M. Warusia Mohamed Kamis, Noor Hisham Abdollah, Mohd Faizal Abdul Razak, Siti Fatimah Yogarayan, Sumendra The internet of things (IoT) is one of data revolution area and is the following extraordinary mechanical jump after the internet. In terms of IoT, it is expected that electronic gadgets that are used on a regular basis would be connected to the current of the internet. IPv6 over low-power wireless personal area networks (6LoWPAN) is a one of IPv6 header pressure technology, and accordingly, it is vulnerable to attack. The IoT is a combination of devices with restricted resource assets like memory, battery power, and computational capability. To solve this, RPL or routing protocol for low power Lossy network is deploy by utilizing a distance vector scheme. One of denial of service (Dos) attack to RPL network is blackhole attack in which the assailant endeavors to become a parent by drawing in a critical volume of traffic to it and drop all packets. In this paper, we discuss research on numerous attacks and current protection methods, focusing on the blackhole attack. There is also discussion of challenge, open research issues and future perspectives in RPL security. Furthermore, research on blackhole attacks and specific detection technique proposed in the literature is also been presented. Institute Of Advanced Engineering And Science (IAES) 2023-05 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/27448/2/0103631102023.PDF S. M. M Yassin, S. M. Warusia Mohamed and Kamis, Noor Hisham and Abdollah, Mohd Faizal and Abdul Razak, Siti Fatimah and Yogarayan, Sumendra (2023) Blackhole attacks in internet of things networks: A review. Indonesian Journal Of Electrical Engineering And Computer Science, 30 (2). pp. 1080-1090. ISSN 2502-4752 https://ijeecs.iaescore.com/index.php/IJEECS/article/view/29769 http://doi.org/10.11591/ijeecs.v30.i2.pp1080-1090 |
institution |
Universiti Teknikal Malaysia Melaka |
building |
UTEM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknikal Malaysia Melaka |
content_source |
UTEM Institutional Repository |
url_provider |
http://eprints.utem.edu.my/ |
language |
English |
description |
The internet of things (IoT) is one of data revolution area and is the following extraordinary mechanical jump after the internet. In terms of IoT, it is expected that electronic gadgets that are used on a regular basis would be connected to the current of the internet. IPv6 over low-power wireless personal area networks (6LoWPAN) is a one of IPv6 header pressure
technology, and accordingly, it is vulnerable to attack. The IoT is a combination of devices with restricted resource assets like memory, battery power, and computational capability. To solve this, RPL or routing protocol for low power Lossy network is deploy by utilizing a distance vector scheme.
One of denial of service (Dos) attack to RPL network is blackhole attack in which the assailant endeavors to become a parent by drawing in a critical volume of traffic to it and drop all packets. In this paper, we discuss research on numerous attacks and current protection methods, focusing on the blackhole attack. There is also discussion of challenge, open research issues and future perspectives in RPL security. Furthermore, research on blackhole attacks and specific detection technique proposed in the literature is also been presented. |
format |
Article |
author |
S. M. M Yassin, S. M. Warusia Mohamed Kamis, Noor Hisham Abdollah, Mohd Faizal Abdul Razak, Siti Fatimah Yogarayan, Sumendra |
spellingShingle |
S. M. M Yassin, S. M. Warusia Mohamed Kamis, Noor Hisham Abdollah, Mohd Faizal Abdul Razak, Siti Fatimah Yogarayan, Sumendra Blackhole attacks in internet of things networks: A review |
author_facet |
S. M. M Yassin, S. M. Warusia Mohamed Kamis, Noor Hisham Abdollah, Mohd Faizal Abdul Razak, Siti Fatimah Yogarayan, Sumendra |
author_sort |
S. M. M Yassin, S. M. Warusia Mohamed |
title |
Blackhole attacks in internet of things networks: A review |
title_short |
Blackhole attacks in internet of things networks: A review |
title_full |
Blackhole attacks in internet of things networks: A review |
title_fullStr |
Blackhole attacks in internet of things networks: A review |
title_full_unstemmed |
Blackhole attacks in internet of things networks: A review |
title_sort |
blackhole attacks in internet of things networks: a review |
publisher |
Institute Of Advanced Engineering And Science (IAES) |
publishDate |
2023 |
url |
http://eprints.utem.edu.my/id/eprint/27448/2/0103631102023.PDF http://eprints.utem.edu.my/id/eprint/27448/ https://ijeecs.iaescore.com/index.php/IJEECS/article/view/29769 http://doi.org/10.11591/ijeecs.v30.i2.pp1080-1090 |
_version_ |
1806429014187835392 |
score |
13.211869 |