E2V: Techniques for detecting and mitigating rank inconsistency attack (RInA) in RPL based Internet of Things

R Stephen, L Arockiam - Journal of Physics: Conference Series, 2018 - iopscience.iop.org
Abstract The Internet of Things (IoT) is a network of physical devices in which smart objects
are interconnected that enable to collect and exchange the information via the internet …

[PDF][PDF] Direct Neighbour Sink Reputed Trust Based Intrusion Detection System to Mitigate Sinkhole Attack in RPL for IoT Networks.

B Patel, P Shah - Journal of Engineering Science & Technology …, 2021 - academia.edu
In terms of heterogeneous devices and sensors, man and machine collaborate seamlessly,
giving birth to the Internet of People, Internet of Things, and Internet of the Future. IoT …

SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism

M Zaminkar, R Fotohi - Wireless Personal Communications, 2020 - Springer
Abstract Through the Internet of Things (IoT) the internet scope is established by the
integration of physical things to classify themselves into mutual things. A physical thing can …

Machine learning based technique for detection of rank attack in RPL based internet of things networks

V Neerugatti, AR Mohan Reddy - … for Detection of Rank Attack in …, 2019 - papers.ssrn.com
Abstract Internet of Things (IoT) is a new Paradiagram in the network technology. It has the
vast application in almost every field like retail, industries, and healthcare etc. It has …

Artificial intelligence-based technique for detection of selective forwarding attack in rpl-based internet of things networks

V Neerugatti, A Rama Mohan Reddy - Emerging Research in Data …, 2020 - Springer
Abstract Internet of Things (IoT) is an upcoming technology in computing networks, which
uses the novel and constrained technologies like IPv6 over Low-powered wireless personal …

Survey of rank attack detection algorithms in Internet of Things

S Kalyani, D Vydeki - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
This paper addresses one of the RPL routing attacks-Rank attack, which is a fundamental
security attack on the routing of in IoT networks. Today, most devices, which are used for …

Vulnerability assessment of objective function of RPL protocol for Internet of Things

F Semedo, N Moradpoor, M Rafiq - Proceedings of the 11th International …, 2018 - dl.acm.org
The Internet of Things (IoT) can be described as the ever-growing global network of objects
with built-in sensing and communication interfaces such as sensors, Global Positioning …

Exponential smoothing based approach for detection of blackhole attacks in IoT

R Sahay, G Geethakumari, B Mitra… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Low power and lossy network (LLN) comprising of constrained devices like sensors and
RFIDs, is a major component in the Internet of Things (IoT) environment as these devices …

A trust-based intrusion detection system for RPL networks: Detecting a combination of rank and blackhole attacks

PP Ioulianou, VG Vassilakis… - Journal of Cybersecurity …, 2022 - mdpi.com
Routing attacks are a major security issue for Internet of Things (IoT) networks utilising
routing protocols, as malicious actors can overwhelm resource-constrained devices with …

Heartbeat-based detection of blackhole and greyhole attacks in RPL networks

EG Ribera, BM Alvarez, C Samuel… - … Networks and Digital …, 2020 - ieeexplore.ieee.org
IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) has been designed to
handle routing in IoT. We investigate the detection of blackhole and greyhole attacks in RPL …