Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks

M Albishari, M Li, R Zhang, E Almosharea - The Journal of …, 2023 - Springer
Security represents one of the main critical issues in the Internet of Things (IoT), especially
the routing attacks in the core network where the loss of information becomes very harmful …

Arp spoofing detection for iot networks using neural networks

H Abdulla, H Al-Raweshidy… - Proceedings of the …, 2020 - papers.ssrn.com
Networks equipped with Internet of Things (IoT) devices are increasingly under threat from
an escalating number of cyber-attacks and breaches (Su et al., 2016). ARP-Spoofing attack …

Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks

S Al-Sarawi, M Anbar, BA Alabsi, MA Aladaileh… - IEEE …, 2023 - ieeexplore.ieee.org
An Internet of Things (IoT) refers to a network of smart devices that enable data collection
and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless …

A reputation‐based RPL protocol to detect selective forwarding attack in Internet of Things

A Patel, D Jinwala - International Journal of Communication …, 2022 - Wiley Online Library
Summary Internet of Things (IoT) is an internet of smart objects where smart objects
communicate with each other. IoT objects are deployed in open medium with dynamic …

[PDF][PDF] Multiple intrusion detection in RPL based networks

MC Belavagi, B Muniyal - International Journal of Electrical and …, 2020 - core.ac.uk
Routing Protocol for Low Power and Lossy Networks based networks consists of large
number of tiny sensor nodes with limited resources. These nodes are directly connected to …

Sliding principal component and dynamic reward reinforcement learning based IIoT attack detection

V Ellappan, A Mahendran, M Subramanian… - Scientific Reports, 2023 - nature.com
Abstract The Internet of Things (IoT) involves the gathering of all those devices that connect
to the Internet with the purpose of collecting and sharing data. The application of IoT in the …

Attack detection in internet of things using software defined network and fuzzy neural network

F Farhin, I Sultana, N Islam, MS Kaiser… - 2020 Joint 9th …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a dynamic and distributed wide network system that can integrate a
gigantic number of pervasive sensors (ie, physical objects), wireless nodes, and ubiquitous …

A lightweight mitigation approach against a new inundation attack in RPL-based IoT networks

M Rouissat, M Belkheir, IS Alsukayti, A Mokaddem - Applied Sciences, 2023 - mdpi.com
Internet of Things (IoT) networks are being widely deployed for a broad range of critical
applications. Without effective security support, such a trend would open the doors to …

Investigations on information solicitation and version number attacks in internet of things

VK Verma, S Sharma - IEEE Sensors Journal, 2022 - ieeexplore.ieee.org
Self-organizing maps (SOMs) have been widely known for resolving a variety of detection
and classification problems. It is a special kind of machine learning technique that sorts out …

An ultimate approach of mitigating attacks in RPL based low power lossy networks

J Kaur - arXiv preprint arXiv:1910.13435, 2019 - arxiv.org
The Routing Protocol for Low-Power and Lossy Networks (RPL) is the existing routing
protocol for Internet of Things (IoT). RPL is a proactive, lightweight, Distance Vector protocol …