A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches

SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… Deepa and Latha [77] suggested a hybrid system for secure and hierarchical routing by
selecting a coordinating head and applying the cluster-based algorithm. Their protocol …

[PDF][PDF] A data driven trust mechanism based on blockchain in IoT sensor networks for detection and mitigation of attacks

D Sivaganesan - Journal of trends in Computer Science and …, 2021 - scholar.archive.org
… The blackhole attack may be mitigated in IoT devices with the help of trust … Clustering
and reliability-driven mitigation of routing attacks in massive IoT systems. Journal of Internet …

Oppositional chaos game optimization based clustering with trust based data transmission protocol for intelligent IoT edge systems

M Padmaa, T Jayasankar, S Venkatraman… - Journal of Parallel and …, 2022 - Elsevier
… In recent times, mobile sinks are utilized in routing additional energy saving and durability
in … as to clusters, and later every cluster chose a CH by estimating the CHCF. If clustering

Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies

K Kaur, A Kaur, Y Gulzar, V Gandhi - Frontiers in Computer Science, 2024 - frontiersin.org
… at various IoT layers are unveiled in this review paper along with the existing mitigation
strategies such as … This multilayer technique uses the cluster-based approach for plotting IDS. …

Security and privacy issues in the internet of things–a survey

JI Johnraja, GJ Leelipushpam… - … on I-SMAC (IoT in …, 2021 - ieeexplore.ieee.org
… and along with these trust models, a mitigation method is also implemented to detect the
attacks. … Using a clustering algorithm, the selection of cluster head is done. Then, the …

Forwarding Neighbor Based Sink Reputed Trust Based Intrusion Detection System to Mitigate Selective Forwarding Attack in RPL for IoT Networks

B Patel, J Vasa, P Shah - SN Computer Science, 2023 - Springer
… In distributed trust propagation, each entity or cluster head deploy TM and disseminate trust
observation to other devices involved in the system. Centralized trust propagation carries the …

A Review of Isolation Attack Mitigation Mechanisms in RPLBased 6LoWPAN of Internet of Things

VR Rajasekar, S Rajkumar - Computer Assisted Methods in …, 2024 - cames.ippt.gov.pl
clusters with designated cluster heads, which amalgamate encrypted data and forward it to
the nearest AP via mesh routing… tested on more minor scales than large IoT networks, so their …

[PDF][PDF] A Trust and Energy-based routing framework for the IoT network

A Mahfozi, Y Darmani - TABRIZ JOURNAL OF ELECTRICAL …, 2023 - tjee.tabrizu.ac.ir
Clustering and reliability-driven mitigation of routing attacks in massive IoT systems. Journal
of Internet Services and Applications, 10, 1-17. [15] Airehrour, D., Gutierrez, JA, & Ray, SK (…

A Trust and Energy-based routing framework for the IoT network

آناهیتا محفوظی, یوسف درمانی - مجله مهندسی برق دانشگاه تبریز, 2024‎ - tjee.tabrizu.ac.ir
Clustering and reliability-driven mitigation of routing attacks in massive IoT systems. Journal
of Internet Services and Applications, 10, 1-17. [15] Airehrour, D., Gutierrez, JA, & Ray, SK (…

[PDF][PDF] Direct Neighbour Sink Reputed Trust Based Intrusion Detection System to Mitigate Sinkhole Attack in RPL for IoT Networks.

B Patel, P Shah - Journal of Engineering Science & Technology …, 2021 - academia.edu
… As IoT environment is vulnerable to routing attacks due to heterogeneity in terms of smart
things… , “Clustering and reliability-driven mitigation of routing attacks in massive IoT systems,” J. …