4.7 Review

A comprehensive survey on detection of sinkhole attack in routing over low power and Lossy network for internet of things

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

A Test Environment for Wireless Hacking in Domestic IoT Scenarios

Antonio Munoz et al.

Summary: Security is becoming increasingly important in the daily lives of individuals, as the adoption of Internet of Things devices changes our understanding of connectivity. This paper explores the vulnerabilities in communication protocols (WiFi, Bluetooth LE, GPS, 433 Mhz, and NFC) and how they can be exploited by attackers, providing relevant tips and countermeasures.

MOBILE NETWORKS & APPLICATIONS (2022)

Article Engineering, Electrical & Electronic

A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem

Mina Zaminkar et al.

Summary: The paper proposes a new method called DSH-RPL for securing the RPL protocol, which includes encryption to address security challenges and comprises four phases, significantly reducing error rates and improving data transmission and detection rates.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2021)

Article Computer Science, Hardware & Architecture

A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest-RFTRUST

K. Prathapchandran et al.

Summary: The Internet of Things (IoT) is vital in various application domains but vulnerable to security threats, thus requiring a lightweight security mechanism for reliable data transmission. The RFTrust model offers a trust-based solution, primarily addressing sinkhole attacks in RPL environments for enhanced trusted routing in the IoT network.

COMPUTER NETWORKS (2021)

Article Computer Science, Information Systems

Evaluating and improving the scalability of RPL security in the Internet of Things

Antonio Arena et al.

COMPUTER COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Routing protocol for Low-Power and Lossy Networks for heterogeneous traffic network

Arslan Musaddiq et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2020)

Review Chemistry, Multidisciplinary

Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT

Karen Avila et al.

APPLIED SCIENCES-BASEL (2020)

Review Computer Science, Hardware & Architecture

Intrusion detection systems in the Internet of things: A comprehensive investigation

Somayye Hajiheidari et al.

COMPUTER NETWORKS (2019)

Article Chemistry, Analytical

Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things

Geethapriya Thamilarasu et al.

SENSORS (2019)

Article Computer Science, Theory & Methods

Perception layer security in Internet of Things

Hasan Ali Khattak et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach

Hamid Bostani et al.

COMPUTER COMMUNICATIONS (2017)

Article Computer Science, Information Systems

Traffic-and-resource-aware intrusion detection in wireless mesh networks

Amin Hassanzadeh et al.

AD HOC NETWORKS (2014)

Article Computer Science, Information Systems

SVELTE: Real-time intrusion detection in the Internet of Things

Shahid Raza et al.

AD HOC NETWORKS (2013)