Secure routing for internet of things: A survey

被引:193
作者
Airehrour, David [1 ]
Gutierrez, Jairo [1 ]
Ray, Sayan Kumar [2 ]
机构
[1] Auckland Univ Technol, Sch Engn Comp & Math Sci, Auckland, New Zealand
[2] Manukau Inst Technol, Fac Business & Informat Technol, Auckland, New Zealand
关键词
IETF; 6LoWPAN; RPL; IEEE; 802.15.4; IoT; Routing; Security; Sensors; WIRELESS SENSOR NETWORKS; IOT; 6LOWPAN;
D O I
10.1016/j.jnca.2016.03.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) could be described as the pervasive and global network which aids and provides a system for the monitoring and control of the physical world through the collection, processing and analysis of generated data by IoT sensor devices. It is projected that by 2020 the number of connected devices is estimated to grow exponentially to 50 billion. The main drivers for this growth are our everyday devices such as cars, refrigerators, fans, lights, mobile phones and other operational technologies including the manufacturing infrastructures which are now becoming connected systems across the world. It is apparent that security will pose a fundamental enabling factor for the successful deployment and use of most IoT applications and in particular secure routing among IoT sensor nodes thus, mechanisms need to be designed to provide secure routing communications for devices enabled by the IoT technology. This survey analyzes existing routing protocols and mechanisms to secure routing communications in IoT, as well as the open research issues. We further analyze how existing approaches ensure secure routing in IoT, their weaknesses, threats to secure routing in IoT and the open challenges and strategies for future research work for a better secure IoT routing. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:198 / 213
页数:16
相关论文
共 112 条
[1]  
Accettura N, 2014, PROC IEEE INT SYMP, P1469, DOI 10.1109/ISIE.2014.6864831
[2]   A Novel Coding Scheme to Implement Signature based IDS in IP based Sensor Networks [J].
Amin, Syed Obaid ;
Siddiqui, Muhammad Shoaib ;
Hong, Choong Seon ;
Choe, Jongwon .
2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT - WORKSHOPS, 2009, :269-+
[3]   The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks [J].
Anhtuan Le ;
Loo, Jonathan ;
Lasebae, Aboubaker ;
Vinel, Alexey ;
Chen, Yue ;
Chai, Michael .
IEEE SENSORS JOURNAL, 2013, 13 (10) :3685-3692
[4]   Two-Way Acknowledgment-Based Trust Framework for Wireless Sensor Networks [J].
Anita, X. ;
Manickam, J. Martin Leo ;
Bhagyaveni, M. A. .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[5]  
[Anonymous], SECURITY MULTIHOP WI
[6]  
[Anonymous], INTERNET THINGS WF I
[7]  
[Anonymous], P 15 INT C COMP MOD
[8]  
[Anonymous], INT J COMPUT APPL
[9]  
[Anonymous], ARXIV11080883V1GRQC
[10]  
[Anonymous], ROUTING PROTOCOL BAS