4.6 Article

Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Machine learning and the Internet of Things security: Solutions and open challenges

Umer Farooq et al.

Summary: Internet of Things (IoT) has been widely used, but it also brings new security challenges, especially in terms of privacy and data security. Researchers improve the security of IoT systems using technologies like machine learning and analyze the current solutions in use. However, ML-based security solutions also face challenges.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2022)

Article Computer Science, Hardware & Architecture

EADCR: Energy Aware Distance Based Cluster Head Selection and Routing Protocol for Wireless Sensor Networks

Akhilesh Panchal et al.

Summary: The paper introduces an Energy Aware Distance-based Cluster Head selection and Routing protocol for Wireless Sensor Networks, which utilizes new clustering and routing strategies to extend network lifetime, save energy, and enhance network coverage.

JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS (2021)

Article Engineering, Electrical & Electronic

A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem

Mina Zaminkar et al.

Summary: The paper proposes a new method called DSH-RPL for securing the RPL protocol, which includes encryption to address security challenges and comprises four phases, significantly reducing error rates and improving data transmission and detection rates.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2021)

Article Computer Science, Information Systems

Subjective logic-based trust model for fog computing

Jalal Al Muhtadi et al.

Summary: Fog computing is a new paradigm that extends cloud computing capabilities to the network edge, providing better location awareness and reducing latency. This study focuses on security and privacy challenges in fog computing, proposing a trust mechanism to address data security issues and demonstrating the efficacy of the model through simulation analysis.

COMPUTER COMMUNICATIONS (2021)

Article Computer Science, Hardware & Architecture

A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest-RFTRUST

K. Prathapchandran et al.

Summary: The Internet of Things (IoT) is vital in various application domains but vulnerable to security threats, thus requiring a lightweight security mechanism for reliable data transmission. The RFTrust model offers a trust-based solution, primarily addressing sinkhole attacks in RPL environments for enhanced trusted routing in the IoT network.

COMPUTER NETWORKS (2021)

Article Chemistry, Analytical

A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things

Noshina Tariq et al.

Summary: This paper presents an energy-efficient decentralized trust mechanism using a blockchain-based multi-mobile code-driven solution for detecting internal attacks in sensor node-powered IoT. The results validate the better performance of the proposed solution over existing solutions, reducing message overhead and malicious node detection time and improving network lifetime.

SENSORS (2021)

Article Telecommunications

CTrust-RPL: A control layer-based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks-based Internet of Things applications

Temur ul Hassan et al.

Summary: This article introduces a novel hierarchical trust-based mechanism CTrust-RPL, which protects the RPL protocol from internal attacks by assessing nodes' forwarding behaviors. By shifting complex trust-related computations to a higher layer, this mechanism saves computational, storage, and energy resources at the node level. Compared to existing techniques, CTrust-RPL demonstrates superior performance in detecting and isolating blackhole attacks.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2021)

Article Computer Science, Theory & Methods

An energy efficient multi-mobile agent itinerary planning approach in wireless sensor networks

Tariq Alsboui et al.

Summary: Mobile Agent technology benefits Wireless Sensor Networks by saving bandwidth and enabling energy efficient data collection. Itinerary planning is crucial for deploying multiple MAs efficiently. The proposed GSMIP approach, utilizing Directed Acyclic Graph techniques, has shown superior energy efficiency and task delay compared to existing methods.

COMPUTING (2021)

Article Engineering, Electrical & Electronic

RPL rank based-attack mitigation scheme in IoT environment

Mohammed Amine Boudouaia et al.

Summary: This article investigates a security flaw in the RPL protocol in IoT networks and proposes a mitigation scheme using a trust threshold. Through detailed simulations, the malicious behavior of the attack and the effectiveness of the proposed scheme were evaluated, including successful detection rate, average network hops, and global energy consumption.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2021)

Article Computer Science, Information Systems

Multicast DIS attack mitigation in RPL-based IoT-LLNs

Faiza Medjek et al.

Summary: The RPL protocol is standardized for IoT routing issues and constructs DODAG topology using DIO messages. However, the DIS attack can significantly impact network performance by increasing control overhead and power consumption.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2021)

Article Telecommunications

MINDS: Mobile Agent Itinerary Planning Using Named Data Networking in Wireless Sensor Networks

Saeid Pourroostaei Ardakani

Summary: The MINDS protocol aims to provide the most suitable path for sensory data collection by minimizing delay, maximizing performance, and reducing transmitted traffic. It partitions the sensor network into data-centric clusters and utilizes tree-based communication infrastructure with a modified Depth-First Search algorithm for mobile agent movement. Simulation results show that MINDS outperforms conventional benchmarks in terms of path length, network traffic reduction, and data robustness in dense and large wireless sensor networks.

JOURNAL OF SENSOR AND ACTUATOR NETWORKS (2021)

Article Computer Science, Information Systems

A comprehensive survey on enhancements and limitations of the RPL protocol: A focus on the objective function

Hanane Lamaazi et al.

AD HOC NETWORKS (2020)

Article Computer Science, Information Systems

An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture

Swarna R. M. Priya et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses

Cong Pu

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Intrusion Detection System for the Internet of Things Based on Blockchain and Multi-Agent Systems

Chao Liang et al.

ELECTRONICS (2020)

Article Computer Science, Information Systems

Trust -aware and cooperative routing protocol for IoT security

Nabil Djedjig et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Review Chemistry, Analytical

Performance Analysis of IoT-Based Health and Environment WSN Deployment

Maryam Shakeri et al.

SENSORS (2020)

Article Computer Science, Theory & Methods

SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things

David Airehrour et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Hardware & Architecture

Dynamic and comprehensive trust model for IoT and its integration into RPL

Seyyed Yasser Hashemi et al.

JOURNAL OF SUPERCOMPUTING (2019)

Article Computer Science, Theory & Methods

A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT

Noshina Tariq et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2019)

Article Computer Science, Software Engineering

A Survey: Intrusion Detection Techniques for Internet of Things

Sarika Choudhary et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions

Zeyad A. Al-Odat et al.

2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1 (2019)

Review Computer Science, Information Systems

Survey on RPL enhancements: A focus on topology, security and mobility

Patrick Olivier Kamgueu et al.

COMPUTER COMMUNICATIONS (2018)

Proceedings Paper Computer Science, Information Systems

Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks

Faiza Medjek et al.

2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (2017)

Article Computer Science, Information Systems

Low-Energy Security: Limits and Opportunities in the Internet of Things

Wade Trappe et al.

IEEE SECURITY & PRIVACY (2015)

Article Computer Science, Information Systems

A survey of black hole attacks in wireless mobile ad hoc networks

Fan-Hsun Tseng et al.

Human-centric Computing and Information Sciences (2011)