Exponential smoothing based approach for detection of blackhole attacks in IoT

R Sahay, G Geethakumari, B Mitra… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Low power and lossy network (LLN) comprising of constrained devices like sensors and
RFIDs, is a major component in the Internet of Things (IoT) environment as these devices …

Trust-based enhanced secure routing against rank and sybil attacks in IoT

A Tandon, P Srivastava - 2019 twelfth international conference …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging technology that plays a vital role in
interconnecting various objects into a network to provide desired services within its resource …

A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest–RFTRUST

K Prathapchandran, T Janani - Computer Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) plays a vital role in many application domains like
battlefield surveillance, wildlife monitoring, disaster response, medical care, transportation …

Blackhole Attack Impact Analysis on Low Power Lossy Networks

N Panda, M Supriya - 2022 IEEE 3rd Global Conference for …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is a network of low-power, low-latency devices that are
becoming smart day by day. The market sees a tremendous rise in the demand for IoT …

A trust-based security model to detect misbehaving nodes in Internet of Things (IoT) environment using logistic regression

K Prathapchandran, T Janani - Journal of physics: conference …, 2021 - iopscience.iop.org
Ensuring authentication in the Internet of Things (IoT) environment is a crucial task because
of its unique characteristics which include sensing, intelligence, large scale, selfconfiguring …

Internet of things: A survey on distributed attack detection using deep learning approach

S Nagtilak, S Rai, R Kale - Proceeding of International Conference on …, 2020 - Springer
Abstract The Internet of Things (IoT) is made up of large number of individuals, things, and
utilities having the potential to intermingle using every one and their surroundings. Due to …

Trust based mechanism for securing iot routing protocol rpl against wormhole &grayhole attacks

R Mehta, MM Parmar - 2018 3rd International Conference for …, 2018 - ieeexplore.ieee.org
Internet of Things is attracting a lot of interest in the modern world and has become a part of
daily life leading to a large scale of distribution of Low power and Lossy Networks (LLN). For …

Heartbeat-based detection of blackhole and greyhole attacks in RPL networks

EG Ribera, BM Alvarez, C Samuel… - … Networks and Digital …, 2020 - ieeexplore.ieee.org
IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) has been designed to
handle routing in IoT. We investigate the detection of blackhole and greyhole attacks in RPL …

A real-time intrusion detection system for wormhole attack in the RPL based Internet of Things

S Deshmukh-Bhosale, SS Sonavane - Procedia Manufacturing, 2019 - Elsevier
Today there is a trend of the Internet of Things (IoT) where many objects are connected to
the internet. In future number of objects connected to the internet will be more as compared …

Dair-mlt: detection and avoidance of IoT routing attacks using machine learning techniques

D Paganraj - International Journal of Information Technology, 2024 - Springer
Abstract The Internet of Things (IoT) aims to increase the physical device's intelligence.
These devices are capable of exchanging data without human intervention. But, IoT devices …