[HTML][HTML] Incremental hybrid intrusion detection for 6LoWPAN

AM Pasikhan, JA Clark, P Gope - Computers & Security, 2023 - Elsevier
Abstract IPv6 over Low-powered Wireless Personal Area Networks (6LoWPAN) has grown
in importance in recent years, with the Routing Protocol for Low Power and Lossy Networks …

Adaptive Hybrid Heterogeneous IDS for 6LoWPAN

AM Pasikhani, JA Clark, P Gope - arXiv preprint arXiv:2205.09170, 2022 - arxiv.org
IPv6 over Low-powered Wireless Personal Area Networks (6LoWPAN) have grown in
importance in recent years, with the Routing Protocol for Low Power and Lossy Networks …

Reinforcement-Learning-based IDS for 6LoWPAN

AM Pasikhani, JA Clark, P Gope - 2021 IEEE 20th International …, 2021 - ieeexplore.ieee.org
The Routing Protocol for low power Lossy networks (RPL) is a critical operational
component of low power wireless personal area networks using IPv6 (6LoWPANs). In this …

Intrusion detection systems in RPL-based 6LoWPAN: A systematic literature review

AM Pasikhani, JA Clark, P Gope… - IEEE Sensors …, 2021 - ieeexplore.ieee.org
Drastic reduction in the manufacturing cost of sensors and actuators has resulted in
considerable growth in the number of smart objects. The so-called Internet of Things (IoT) …

Adversarial RL-based IDS for evolving data environment in 6LoWPAN

AM Pasikhani, JA Clark, P Gope - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Low-power and Lossy Networks (LLNs) comprise nodes characterised by constrained
computational power, memory, and energy resources. The LLN nodes empower ubiquitous …

[HTML][HTML] A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things

TA Al-Amiedy, M Anbar, B Belaton, AHH Kabla… - Sensors, 2022 - mdpi.com
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6
Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in …

Intrusion detection in the RPL-connected 6LoWPAN networks

D Shreenivas, S Raza, T Voigt - … of the 3rd ACM international workshop …, 2017 - dl.acm.org
The interconnectivity of 6LoWPAN networks with the Internet raises serious security
concerns, as constrained 6LoWPAN devices are accessible anywhere from the untrusted …

Neighbor-passive monitoring technique for detecting sinkhole attacks in RPL networks

M Alzubaidi, M Anbar, SM Hanshi - Proceedings of the 2017 …, 2017 - dl.acm.org
Internet Protocol version 6 (IPv6) over Low-power Wireless Personal Area Networks
(6LoWPAN) is extensively used in wireless sensor networks due to its capability to transmit …

A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things

TA Al-Amiedy, M Anbar, B Belaton, AA Bahashwan… - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is one of the most rapidly evolving networking concepts,
offering various applications for human benefit. Advances in embedded system architecture …

CRA-RPL: A Novel Lightweight challenge-Response authentication-based technique for securing RPL against dropped DAO attacks

S Goel, A Verma, VK Jain - Computers & Security, 2023 - Elsevier
Abstract IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) is one of the
most prominent networking technologies currently fueling the drastic growth of the Internet of …