A Lightweight Energy-Efficient Algorithm for mitigation and isolation of Internal Rank Attackers in RPL based Internet of Things

PS Nandhini, S Kuppuswami, S Malliga, R DeviPriya - Computer Networks, 2022 - Elsevier
Abstract Internet of Things (IoT) has become a pivotal technology for connecting various
physical things or devices to the internet. Despite the potential advantages, security in IoT …

Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers

PS Nandhini, S Kuppuswami, S Malliga… - The Journal of …, 2023 - Springer
Abstract Internet of Things (IoT) is becoming a crucial requirement for linking numerous
physical devices or gadgets to the web. Due to large volume of data exchanged, security in …

Security against rank attack in RPL protocol

MA Boudouaia, A Ali-Pacha, A Abouaissa… - IEEE …, 2020 - ieeexplore.ieee.org
The Routing Protocol for Low Power and Lossy Networks (RPL) is experiencing a wave of
security threats, due to the need of its utility in the Internet of Things (IoT). RPL is so far …

[PDF][PDF] Securing RPL Routing Path for IoT against rank attack via utilizing layering technique.

AR Zarzoor - International Journal on Electrical Engineering & …, 2021 - researchgate.net
RPL is common protocol for the Internet of Things (IoT) network, that used for routing data
freely among smart" things" in various environments. Which makes them susceptible to …

Survey of rank attack detection algorithms in Internet of Things

S Kalyani, D Vydeki - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
This paper addresses one of the RPL routing attacks-Rank attack, which is a fundamental
security attack on the routing of in IoT networks. Today, most devices, which are used for …

Detection and mitigation of rpl rank and version number attacks in smart internet of things

ZA Almusaylim, A Alhumam, W Mansoor, P Chatterjee… - 2020 - preprints.org
The rapid growth of the smart Internet of Things (IoT) and massive propagation of wireless
technologies revealed the recent opportunities for development in various domains of real …

EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things

AO Bang, UP Rao - Peer-to-Peer Networking and Applications, 2022 - Springer
Abstract Routing Protocol for Low Power and Lossy Networks (RPL) is the only standard
protocol that assists the routing process in Low Power and Lossy Networks (LLNs)-based …

LEADER: low overhead rank attack detection for securing RPL based IoT

S Karmakar, J Sengupta, SD Bit - … International Conference on …, 2021 - ieeexplore.ieee.org
In recent times researchers have found several security vulnerabilities in the Routing
Protocol for Low power and Lossy network (RPL), amongst which rank attack is a …

Machine learning based technique for detection of rank attack in RPL based internet of things networks

V Neerugatti, AR Mohan Reddy - … for Detection of Rank Attack in …, 2019 - papers.ssrn.com
Abstract Internet of Things (IoT) is a new Paradiagram in the network technology. It has the
vast application in almost every field like retail, industries, and healthcare etc. It has …

[HTML][HTML] Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP

Z A. Almusaylim, NZ Jhanjhi, A Alhumam - Sensors, 2020 - mdpi.com
The rapid growth of the Internet of Things (IoT) and the massive propagation of wireless
technologies has revealed recent opportunities for development in various domains of real …