E2V: Techniques for detecting and mitigating rank inconsistency attack (RInA) in RPL based Internet of Things

R Stephen, L Arockiam - Journal of Physics: Conference Series, 2018 - iopscience.iop.org
Abstract The Internet of Things (IoT) is a network of physical devices in which smart objects
are interconnected that enable to collect and exchange the information via the internet …

[HTML][HTML] Routing attack induced anomaly detection in IoT network using RBM-LSTM

R Sahay, A Nayyar, RK Shrivastava, M Bilal, SP Singh… - ICT Express, 2024 - Elsevier
The network of resource constraint devices, also known as the Low power and Lossy
Networks (LLNs), constitutes the edge tire of the Internet of Things applications like smart …

Security against rank attack in RPL protocol

MA Boudouaia, A Ali-Pacha, A Abouaissa… - IEEE …, 2020 - ieeexplore.ieee.org
The Routing Protocol for Low Power and Lossy Networks (RPL) is experiencing a wave of
security threats, due to the need of its utility in the Internet of Things (IoT). RPL is so far …

Security Vulnerabilities and Countermeasures in the RPL-based Internet of Things

W Yang, Y Wang, Z Lai, Y Wan… - … conference on cyber …, 2018 - ieeexplore.ieee.org
RPL is a routing protocol for Low-Power and Lossy Networks, which is the routing protocol
standardized for the Internet of Things (IoT). However, RPL has many serious vulnerabilities …

An intrusion detection system for blackhole attack detection and isolation in RPL based IoT using ANN

C Prajisha, AR Vasudevan - International Advanced Computing …, 2021 - Springer
Abstract Routing Protocol for Low Power and Lossy Networks (RPL) is a simple and
lightweight routing protocol for Internet of Things (IoT). RPL-based IoT networks are prone to …

[PDF][PDF] Securing IoT Networks: RPL Attack Detection with Deep Learning GRU Networks

R Bokka, T Sadasivam - International Journal of Recent …, 2023 - ijresonline.com
The Internet of Things (IoT) can be defined as the internet-based connectivity of
heterogeneous intelligent devices to control and run them. Smart gadgets and wireless …

Assessing the Impact of Mobile Attackers on RPL-based Internet of Things

C Dogan, S Yilmaz, S Sen - arXiv preprint arXiv:2303.16499, 2023 - arxiv.org
The Internet of Things (IoT) is becoming ubiquitous in our daily life. IoT networks that are
made up of devices low power, low memory, and low computing capability appears in many …

An intrusion detection system for RPL-based IoT networks

E Garcia Ribera, B Martinez Alvarez, C Samuel… - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) has become very popular during the last decade by providing
new solutions to modern industry and to entire societies. At the same time, the rise of the …

Feature Selection Using Firefly Algorithm for Classification of Attacks in Routing Protocol for Low Power Lossy Networks (LLNs) Based Internet of Things (IoT) …

PS Nandhini, S Bharani, M Harish… - … on Smart Electronics …, 2023 - ieeexplore.ieee.org
IoT (Internet of Things) is a collection of diverse resource-constrained things or nodes. All
the IoT devices used to collect and share data are connected through Internet. Since all the …

An experimental study of iot networks under internal routing attack

M Alreshoodi - Available at SSRN 3690813, 2020 - papers.ssrn.com
Abstract Internet of Things (IoT) deployments mostly relies on the establishment of Low-
Power and Lossy Networks (LLNs) among a large number of constraint devices. The Internet …