[HTML][HTML] A trust-based intrusion detection system for RPL networks: Detecting a combination of rank and blackhole attacks

PP Ioulianou, VG Vassilakis… - Journal of Cybersecurity …, 2022 - mdpi.com
Routing attacks are a major security issue for Internet of Things (IoT) networks utilising
routing protocols, as malicious actors can overwhelm resource-constrained devices with …

Lightweight Mitigation Against DIO Suppression Attack In RPL-Based IoT Networks

G Tahar, BAZ Eddine, B Djalila - 2024 6th International …, 2024 - ieeexplore.ieee.org
The past decade has seen a technological revolution brought about by the Internet of Things
(IoT). Due to the characteristics of sensors in IoT networks and the lack of security on the …

Acknowledgement based technique for detection of the wormhole attack in RPL based Internet of Things networks

V Neerugatti, ARM Reddy - Asian Journal of Computer Science and …, 2019 - ajcst.co
Abstract Internet of Things (IoT) is the advanced technology, were the constrained
nodes/things (all the objects around us such as chair, home, car, keys, etc.) will be …

Analysis of hatchetman attack in RPL based IoT networks

G Sharma, J Grover, A Verma, R Kumar… - … Conference on Emerging …, 2022 - Springer
Low power and lossy networks (LLN) are flourishing as an integral part of communication
infrastructure, particularly for growing Internet of Things (IoT) applications. RPL-based LLNs …

A Comprehensive Study on Routing Attacks with Countermeasures in Internet of Things

CL Hepsiba, RJ Priyadarsini… - Solid State …, 2020 - solidstatetechnology.us
Network Security is one of the significant issues during the time of data transfer in IoT. On the
basis of network infrastructure, IoT lets an object to en-route remotely control and sense, that …

[PDF][PDF] Artificial neural network model for decreased rank attack detection in RPL based on IoT networks

M Osman, J He, FMM Mokbal, N Zhu - Int. J. Netw. Secur, 2021 - ijns.jalaxy.com.tw
Abstract Internet of Things (IoT) cyber-attacks are growing day by day because of the
constrained nature of the IoT devices and the lack of effective security countermeasures …

SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things

M Conti, P Kaliyar, MM Rabbani… - 2018 14th International …, 2018 - ieeexplore.ieee.org
Due to recent notorious security threats, like Mirai-botnet, it is challenging to perform efficient
data communication and routing in low power and lossy networks (LLNs) such as Internet of …

A central intrusion detection system for rpl-based industrial internet of things

E Aydogan, S Yilmaz, S Sen, I Butun… - 2019 15th IEEE …, 2019 - ieeexplore.ieee.org
Although Internet-of-Things (IoT) is revolutionizing the IT sector, it is not mature yet as
several technologies are still being offered to be candidates for supporting the backbone of …

Digital signature based countermeasure against puppet attack in the Internet of Things

C Pu, L Carpenter - 2019 IEEE 18th International Symposium …, 2019 - ieeexplore.ieee.org
In order to achieve the goal of smooth interaction and communication, a novel distance
vector and source routing protocol, also officially referred to as RPL, has been proposed for …

RPL routing protocol performance under sinkhole and selective forwarding attack: experimental and simulated evaluation

BH Patel, P Shah - … Telecommunication Computing Electronics …, 2020 - telkomnika.uad.ac.id
To make possible dream of connecting 30 billion smart devices assessable from anywhere,
anytime and to fuel the engine growth of Internet of things (IoT) both in terms of physical and …