Related references
Note: Only part of the references are listed.Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset
John Foley et al.
SECURITY AND COMMUNICATION NETWORKS (2020)
Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL)
Isam Wadhaj et al.
IEEE ACCESS (2020)
RPL Attack Detection and Prevention in the Internet of Things Networks Using a GRU Based Deep Learning
Semih Cakir et al.
IEEE ACCESS (2020)
SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things
David Airehrour et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
IoT Enabled UAV: Network Architecture and Routing Algorithm
Qixun Zhang et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
RPL-Based Routing Protocols in IoT Applications: A Review
Harith Kharrufa et al.
IEEE SENSORS JOURNAL (2019)
A Gini Index-Based Countermeasure Against Sybil Attack in the Internet of Things
Bryan Groves et al.
MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM) (2019)
Simulating Attacks for RPL and Generating Multi-class Dataset for Supervised Machine Learning
Mridula Sharma et al.
2019 IEEE 10TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON) (2019)
An Anomaly-Based IDS for Detecting Attacks in RPL-Based Internet of Things
Behnam Farzaneh et al.
2019 5TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR) (2019)
Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey
Hyung-Sin Kim et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)
Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach
Hamid Bostani et al.
COMPUTER COMMUNICATIONS (2017)
Secure routing for internet of things: A survey
David Airehrour et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
SVELTE: Real-time intrusion detection in the Internet of Things
Shahid Raza et al.
AD HOC NETWORKS (2013)
The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks
Anhtuan Le et al.
IEEE SENSORS JOURNAL (2013)