4.7 Article

Secured location-aware mobility-enabled RPL

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function

Cong Pu et al.

Summary: In this study, we propose a lightweight Bloom filter and physical unclonable function (PUF) based sybil attack detection mechanism for RPL-based IoT. Our mechanism achieves optimization in terms of detection accuracy, detection latency, and energy consumption through the use of Bloom filter and probabilistic DIO reply mechanism.

COMPUTERS & SECURITY (2022)

Article Computer Science, Information Systems

A lightweight distributed detection algorithm for DDAO attack on RPL routing protocol in Internet of Things

Mohsen Sheibani et al.

Summary: This study introduces a new attack called DDAO and proposes a new IDS to counter this attack in the RPL protocol. The proposed IDS can detect DDAO attacks with high accuracy and low false positive rate, and it improves the packet delivery rate when countering attacks.

PERVASIVE AND MOBILE COMPUTING (2022)

Article Computer Science, Hardware & Architecture

A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest-RFTRUST

K. Prathapchandran et al.

Summary: The Internet of Things (IoT) is vital in various application domains but vulnerable to security threats, thus requiring a lightweight security mechanism for reliable data transmission. The RFTrust model offers a trust-based solution, primarily addressing sinkhole attacks in RPL environments for enhanced trusted routing in the IoT network.

COMPUTER NETWORKS (2021)

Article Computer Science, Information Systems

Intrusion detection systems for RPL security: A comparative analysis

George Simoglou et al.

Summary: The Internet of Things (IoT) technology has seen significant growth in recent years, with the standard routing solution RPL facing security challenges. Innovative Intrusion Detection Systems (IDSs) have been proposed in the literature to address the protocol's security issues in recent years.

COMPUTERS & SECURITY (2021)

Article Computer Science, Hardware & Architecture

A Novel Intrusion Detection System for RPL-Based Cyber-Physical Systems

Mridula Sharma et al.

Summary: The article proposes a novel Supervised machine learning-based IDS that can detect various attacks. Experimental results show that the IDS can detect four different types of attacks seen by the training phase machine learning models, as well as classify unknown attack types.

IEEE CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING (2021)

Article Computer Science, Theory & Methods

A Transfer Learning Approach for Securing Resource-Constrained IoT Devices

Selim Yilmaz et al.

Summary: This study examines the application of transfer learning to generate intrusion detection algorithms for dynamically changing IoT, including generating suitable intrusion algorithms for new devices and detecting new types of attacks. Experimental results show that the transfer learning approach outperforms the traditional approach and significantly reduces learning time.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Review Computer Science, Information Systems

Proposing a Secure RPL based Internet of Things Routing Protocol: A Review

Zahrah A. Almusaylim et al.

AD HOC NETWORKS (2020)

Review Engineering, Electrical & Electronic

Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review

Abhishek Verma et al.

IEEE SENSORS JOURNAL (2020)

Article Computer Science, Information Systems

A Lightweight Intrusion Detection for Sybil Attack Under Mobile RPL in the Internet of Things

Sarumathi Murali et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses

Cong Pu

IEEE INTERNET OF THINGS JOURNAL (2020)

Review Computer Science, Hardware & Architecture

A survey on technologies and security protocols: Reference for future generation IoT

R. Yugha et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Hardware & Architecture

Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics

Mobasshir Mahbub

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Hardware & Architecture

Optimized mobility management for RPL/6LoWPAN based IoT network architecture using the firefly algorithm

K. Manikannan et al.

MICROPROCESSORS AND MICROSYSTEMS (2020)

Article Computer Science, Theory & Methods

SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things

David Airehrour et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Telecommunications

Addressing the DAO Insider Attack in RPL's Internet of Things Networks

Baraq Ghaleb et al.

IEEE COMMUNICATIONS LETTERS (2019)

Article Computer Science, Information Systems

mRPL plus : A mobility management framework in RPL/6LoWPAN

Hossein Fotouhi et al.

COMPUTER COMMUNICATIONS (2017)

Article Computer Science, Hardware & Architecture

Low-power and lossy networks under mobility: A survey

Afonso Oliveira et al.

COMPUTER NETWORKS (2016)

Article Computer Science, Information Systems

A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology

Anhtuan Le et al.

INFORMATION (2016)

Article Computer Science, Information Systems

mRPL: Boosting mobility in the Internet of Things

Hossein Fotouhi et al.

AD HOC NETWORKS (2015)

Article Computer Science, Information Systems

SVELTE: Real-time intrusion detection in the Internet of Things

Shahid Raza et al.

AD HOC NETWORKS (2013)

Article Computer Science, Hardware & Architecture

RPL in a nutshell: A survey

Olfa Gaddour et al.

COMPUTER NETWORKS (2012)