Blackhole attacks in internet of things networks: A review

The internet of things (IoT) is one of data revolution area and is the following extraordinary mechanical jump after the internet. In terms of IoT, it is expected that electronic gadgets that are used on a regular basis would be connected to the current of the internet. IPv6 over low-power wireless...

Full description

Saved in:
Bibliographic Details
Main Authors: S. M. M Yassin, S. M. Warusia Mohamed, Kamis, Noor Hisham, Abdollah, Mohd Faizal, Abdul Razak, Siti Fatimah, Yogarayan, Sumendra
Format: Article
Language:English
Published: Institute Of Advanced Engineering And Science (IAES) 2023
Online Access:http://eprints.utem.edu.my/id/eprint/27448/2/0103631102023.PDF
http://eprints.utem.edu.my/id/eprint/27448/
https://ijeecs.iaescore.com/index.php/IJEECS/article/view/29769
http://doi.org/10.11591/ijeecs.v30.i2.pp1080-1090
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utem.eprints.27448
record_format eprints
spelling my.utem.eprints.274482024-07-11T13:07:21Z http://eprints.utem.edu.my/id/eprint/27448/ Blackhole attacks in internet of things networks: A review S. M. M Yassin, S. M. Warusia Mohamed Kamis, Noor Hisham Abdollah, Mohd Faizal Abdul Razak, Siti Fatimah Yogarayan, Sumendra The internet of things (IoT) is one of data revolution area and is the following extraordinary mechanical jump after the internet. In terms of IoT, it is expected that electronic gadgets that are used on a regular basis would be connected to the current of the internet. IPv6 over low-power wireless personal area networks (6LoWPAN) is a one of IPv6 header pressure technology, and accordingly, it is vulnerable to attack. The IoT is a combination of devices with restricted resource assets like memory, battery power, and computational capability. To solve this, RPL or routing protocol for low power Lossy network is deploy by utilizing a distance vector scheme. One of denial of service (Dos) attack to RPL network is blackhole attack in which the assailant endeavors to become a parent by drawing in a critical volume of traffic to it and drop all packets. In this paper, we discuss research on numerous attacks and current protection methods, focusing on the blackhole attack. There is also discussion of challenge, open research issues and future perspectives in RPL security. Furthermore, research on blackhole attacks and specific detection technique proposed in the literature is also been presented. Institute Of Advanced Engineering And Science (IAES) 2023-05 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/27448/2/0103631102023.PDF S. M. M Yassin, S. M. Warusia Mohamed and Kamis, Noor Hisham and Abdollah, Mohd Faizal and Abdul Razak, Siti Fatimah and Yogarayan, Sumendra (2023) Blackhole attacks in internet of things networks: A review. Indonesian Journal Of Electrical Engineering And Computer Science, 30 (2). pp. 1080-1090. ISSN 2502-4752 https://ijeecs.iaescore.com/index.php/IJEECS/article/view/29769 http://doi.org/10.11591/ijeecs.v30.i2.pp1080-1090
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
description The internet of things (IoT) is one of data revolution area and is the following extraordinary mechanical jump after the internet. In terms of IoT, it is expected that electronic gadgets that are used on a regular basis would be connected to the current of the internet. IPv6 over low-power wireless personal area networks (6LoWPAN) is a one of IPv6 header pressure technology, and accordingly, it is vulnerable to attack. The IoT is a combination of devices with restricted resource assets like memory, battery power, and computational capability. To solve this, RPL or routing protocol for low power Lossy network is deploy by utilizing a distance vector scheme. One of denial of service (Dos) attack to RPL network is blackhole attack in which the assailant endeavors to become a parent by drawing in a critical volume of traffic to it and drop all packets. In this paper, we discuss research on numerous attacks and current protection methods, focusing on the blackhole attack. There is also discussion of challenge, open research issues and future perspectives in RPL security. Furthermore, research on blackhole attacks and specific detection technique proposed in the literature is also been presented.
format Article
author S. M. M Yassin, S. M. Warusia Mohamed
Kamis, Noor Hisham
Abdollah, Mohd Faizal
Abdul Razak, Siti Fatimah
Yogarayan, Sumendra
spellingShingle S. M. M Yassin, S. M. Warusia Mohamed
Kamis, Noor Hisham
Abdollah, Mohd Faizal
Abdul Razak, Siti Fatimah
Yogarayan, Sumendra
Blackhole attacks in internet of things networks: A review
author_facet S. M. M Yassin, S. M. Warusia Mohamed
Kamis, Noor Hisham
Abdollah, Mohd Faizal
Abdul Razak, Siti Fatimah
Yogarayan, Sumendra
author_sort S. M. M Yassin, S. M. Warusia Mohamed
title Blackhole attacks in internet of things networks: A review
title_short Blackhole attacks in internet of things networks: A review
title_full Blackhole attacks in internet of things networks: A review
title_fullStr Blackhole attacks in internet of things networks: A review
title_full_unstemmed Blackhole attacks in internet of things networks: A review
title_sort blackhole attacks in internet of things networks: a review
publisher Institute Of Advanced Engineering And Science (IAES)
publishDate 2023
url http://eprints.utem.edu.my/id/eprint/27448/2/0103631102023.PDF
http://eprints.utem.edu.my/id/eprint/27448/
https://ijeecs.iaescore.com/index.php/IJEECS/article/view/29769
http://doi.org/10.11591/ijeecs.v30.i2.pp1080-1090
_version_ 1806429014187835392
score 13.188404