Towards a light weight routing security in IoT using non-cooperative game models and Dempster–Shaffer theory

V Kiran, S Rani, P Singh - Wireless Personal Communications, 2020 - Springer
The internet of things (IoT) has become an emerging technology owing to the rapidly
increasing number of devices and their connectivity to the internet. Routing protocol for low …

Hidden Markov trust for attenuation of selfish and malicious nodes in the IoT network

G Joshi, V Sharma - Wireless Personal Communications, 2023 - Springer
The exposure of IoT nodes to the internet makes them vulnerable to malicious attacks and
failures. These failures affect the survivability, integrity, and connectivity of the network. Thus …

Anomaly-based intrusion detection system in RPL by applying stochastic and evolutionary game models over IoT environment

DB Gothawal, SV Nagaraj - Wireless Personal Communications, 2020 - Springer
The rapid development of Information and Communication Technology and the growing
number of devices connected to the Internet make the Internet of Things (IoT) as a promising …

A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches

SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and
exchange data. These “things” can be sensors, actuators, smartphones, wearables …

Dynamic and comprehensive trust model for IoT and its integration into RPL

SY Hashemi, F Shams Aliee - The Journal of Supercomputing, 2019 - Springer
Ensuring security in IoT routing protocols is more challenging due to the fact that devices are
mobile, resource constrained, and heterogeneous. The routing protocol for low-power and …

Trust-aware and cooperative routing protocol for IoT security

N Djedjig, D Tandjaoui, F Medjek… - Journal of Information …, 2020 - Elsevier
The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power
and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification …

Selfish node detection based on hierarchical game theory in IoT

S Nobahary, HG Garakani, A Khademzadeh… - EURASIP Journal on …, 2019 - Springer
Cooperation between nodes is an effective technology for network throughput in the Internet
of Things. The nodes that do not cooperate with other nodes in the network are called selfish …

MCTE-RPL: A Multi-Context Trust-based Efficient RPL for IoT

J Mohajerani, MM Ghanatghestani… - Journal of Network and …, 2024 - Elsevier
Abstract The Internet of things (IoT) is highly exposed to various attacks due to its sensitive
applications, but it is very vulnerable in dealing with these attacks. So, various studies have …

A trust-based model for secure routing against RPL attacks in internet of things

SM Muzammal, RK Murugesan, NZ Jhanjhi… - Sensors, 2022 - mdpi.com
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is
vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …

Safeguarding the Internet of Things: Elevating IoT routing security through trust management excellence

AW Burange, VM Deshmukh, YA Thakare… - Computer Standards & …, 2025 - Elsevier
This study presents an innovative IoT routing security model that integrates trust
management to bolster network reliability, improve resilience against routing attacks, and …