Related references
Note: Only part of the references are listed.Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function
Cong Pu et al.
COMPUTERS & SECURITY (2022)
A lightweight distributed detection algorithm for DDAO attack on RPL routing protocol in Internet of Things
Mohsen Sheibani et al.
PERVASIVE AND MOBILE COMPUTING (2022)
A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest-RFTRUST
K. Prathapchandran et al.
COMPUTER NETWORKS (2021)
Intrusion detection systems for RPL security: A comparative analysis
George Simoglou et al.
COMPUTERS & SECURITY (2021)
A Novel Intrusion Detection System for RPL-Based Cyber-Physical Systems
Mridula Sharma et al.
IEEE CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING (2021)
A Transfer Learning Approach for Securing Resource-Constrained IoT Devices
Selim Yilmaz et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Proposing a Secure RPL based Internet of Things Routing Protocol: A Review
Zahrah A. Almusaylim et al.
AD HOC NETWORKS (2020)
Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review
Abhishek Verma et al.
IEEE SENSORS JOURNAL (2020)
A Lightweight Intrusion Detection for Sybil Attack Under Mobile RPL in the Internet of Things
Sarumathi Murali et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses
Cong Pu
IEEE INTERNET OF THINGS JOURNAL (2020)
A survey on technologies and security protocols: Reference for future generation IoT
R. Yugha et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)
Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics
Mobasshir Mahbub
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)
Optimized mobility management for RPL/6LoWPAN based IoT network architecture using the firefly algorithm
K. Manikannan et al.
MICROPROCESSORS AND MICROSYSTEMS (2020)
Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP
Zahrah A. Almusaylim et al.
SENSORS (2020)
SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things
David Airehrour et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Addressing the DAO Insider Attack in RPL's Internet of Things Networks
Baraq Ghaleb et al.
IEEE COMMUNICATIONS LETTERS (2019)
mRPL plus : A mobility management framework in RPL/6LoWPAN
Hossein Fotouhi et al.
COMPUTER COMMUNICATIONS (2017)
Low-power and lossy networks under mobility: A survey
Afonso Oliveira et al.
COMPUTER NETWORKS (2016)
A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology
Anhtuan Le et al.
INFORMATION (2016)
mRPL: Boosting mobility in the Internet of Things
Hossein Fotouhi et al.
AD HOC NETWORKS (2015)
SVELTE: Real-time intrusion detection in the Internet of Things
Shahid Raza et al.
AD HOC NETWORKS (2013)
RPL in a nutshell: A survey
Olfa Gaddour et al.
COMPUTER NETWORKS (2012)