Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things

C Cervantes, D Poplade, M Nogueira… - 2015 IFIP/IEEE …, 2015 - ieeexplore.ieee.org
The Internet of Things (IoT) networks are vulnerable to various kinds of attacks, being the
sinkhole attack one of the most destructive since it prevents communication among network …

Design and analysis of probing route to defense sink-hole attacks for Internet of Things security

Y Liu, M Ma, X Liu, NN Xiong, A Liu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) applications have been growing significantly in recent years,
however, the security issue has not been well studied in the literature for the IoT ecosystem …

[HTML][HTML] Routing attacks detection in 6lowpan-based internet of things

A Alazab, A Khraisat, S Singh, S Bevinakoppa… - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) has become increasingly popular, and opened new possibilities
for applications in various domains. However, the IoT also poses security challenges due to …

SVELTE: Real-time intrusion detection in the Internet of Things

S Raza, L Wallgren, T Voigt - Ad hoc networks, 2013 - Elsevier
Abstract In the Internet of Things (IoT), resource-constrained things are connected to the
unreliable and untrusted Internet via IPv6 and 6LoWPAN networks. Even when they are …

Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach

H Bostani, M Sheikhan - Computer Communications, 2017 - Elsevier
Abstract Internet of Things (IoT) is a novel paradigm in computer networks in which resource-
constrained objects connect to unreliable Internet by using a wide range of technologies …

Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices

M Eskandari, ZH Janjua, M Vecchio… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Cyber-threat protection is today's one of the most challenging research branches of
information technology, while the exponentially increasing number of tiny, connected …

Intrusion detection in the RPL-connected 6LoWPAN networks

D Shreenivas, S Raza, T Voigt - … of the 3rd ACM international workshop …, 2017 - dl.acm.org
The interconnectivity of 6LoWPAN networks with the Internet raises serious security
concerns, as constrained 6LoWPAN devices are accessible anywhere from the untrusted …

InDReS: An Intrusion Detection and response system for Internet of Things with 6LoWPAN

M Surendar, A Umamakeswari - 2016 International Conference …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), an emerging Internet based technical architecture where
heterogeneous sensors collaborate for ubiquitous computing based on several technologies …

ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things

P Shukla - 2017 intelligent systems conference (IntelliSys), 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is an emerging business model aimed to connect many low-power
embedded devices with internet. IoT has many applications in building smart cities, smart …

A review on the security of IoT networks: From network layer's perspective

A Jahangeer, SU Bazai, S Aslam, S Marjan… - IEEE …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) has revolutionized the world in the last decade. Today millions of
devices are connected to each other utilizing IoT technology in one way or the other. With …