A review on the security of IoT networks: From network layer's perspective

A Jahangeer, SU Bazai, S Aslam, S Marjan… - IEEE …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) has revolutionized the world in the last decade. Today millions of
devices are connected to each other utilizing IoT technology in one way or the other. With …

Detection of rank attack in routing protocol for Low Power and Lossy Networks

U Shafique, A Khan, A Rehman, F Bashir… - Annals of …, 2018 - Springer
Abstract Internet Engineering Task Force (IETF) has recommended the use of routing
protocol for Low Power and Lossy Network (RPL) for Internet Protocol version 6 (IPv6) …

Denial-of-Service detection in 6LoWPAN based Internet of Things

P Kasinathan, C Pastrone, MA Spirito… - 2013 IEEE 9th …, 2013 - ieeexplore.ieee.org
Smart objects connected to the Internet, constituting the so called Internet of Things (IoT), are
revolutionizing human beings' interaction with the world. As technology reaches …

Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review

A Verma, V Ranga - IEEE Sensors Journal, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large
number of applications for the benefit of mankind. Advancements in embedded system …

Designing efficient sinkhole attack detection mechanism in edge-based IoT deployment

S Pundir, M Wazid, DP Singh, AK Das, JJPC Rodrigues… - Sensors, 2020 - mdpi.com
The sinkhole attack in an edge-based Internet of Things (IoT) environment (EIoT) can
devastate and ruin the whole functioning of the communication. The sinkhole attacker nodes …

Survey of intrusion detection systems towards an end to end secure internet of things

AA Gendreau, M Moorman - … on future internet of things and …, 2016 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the largest technological evolutions of computing, by
2022 it is estimated that a trillion IP addresses (objects) will be connected to the Internet. The …

A lightweight intrusion detection scheme based on energy consumption analysis in 6LowPAN

TH Lee, CH Wen, LH Chang, HS Chiang… - … and Multimedia for …, 2014 - Springer
Abstract 6LoWPAN is one of Internet of Things standard, which allows IPv6 over the low-rate
wireless personal area networks. All sensor nodes have their own IPv6 address to connect …

[PDF][PDF] Real time intrusion and wormhole attack detection in internet of things

P Pongle, G Chavan - International Journal of Computer Applications, 2015 - academia.edu
There are currently more objects connected to the Internet than people in the world. This gap
will continue to grow, as more objects gain the ability to directly interface with the Internet …

Routing attacks and countermeasures in the RPL-based internet of things

L Wallgren, S Raza, T Voigt - International Journal of …, 2013 - journals.sagepub.com
The Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol
standardized for constrained environments such as 6LoWPAN networks. Providing security …

A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things

TA Al-Amiedy, M Anbar, B Belaton, AA Bahashwan… - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is one of the most rapidly evolving networking concepts,
offering various applications for human benefit. Advances in embedded system architecture …