A Giri, A Goyal, A Kogta, P Jain, P Verma - … and Virtual Mobile Networks, 2023 - Springer
… of the network which is why it is critical to identify the attacks and avoid as much damage as possible to the network. In this paper, we will be focusing on some of the attacks mentioned …
TZB Maung, L Wuttisittikulkij - The 14th Regional Conference on …, 2022 - researchgate.net
… many kinds of attacks on RPL routing, Sinkhole is a very potent attack in RPL. Sinkhole attacks can harm the RPL network by either itself or coupled with other attacks. And then, a …
C Cervantes, D Poplade, M Nogueira… - … on Integrated Network …, 2015 - ieeexplore.ieee.org
… Communication model: The devices communication model employs the RPL protocol (IPv6 Routing Protocol for Low power and LossyNetworks), which respects the resource …
K Weekly, K Pister - … IEEE International Conference on Network …, 2012 - ieeexplore.ieee.org
… Task Force (IETF) Routing Protocol for Low-power and LossyNetworks (RPL) [6] [7] is the … we aim to investigate sinkholeattacks on a WSN routing layer. A sinkholeattack is a Denial …
… for ensuring security in the IoT network. It is primarily designed to address the sinkhole attack in Routing Protocol for Low power and Lossynetworks (RPL) based IoT environments. It …
… the network, and it can make a huge network isolation and loss the high percentage of traffic loss. This thesis studies the damage of Sinkholeattack in RPL networks … that sinkholeattack. …
… [31] designed a mechanism to detect sinkholeattack in Wireless Sensor Networks (WSNs). In the proposed mechanism, the attackers’ nodes are detected by considering the flow of …
M Alzubaidi, M Anbar, S Al-Saleem… - 2017 8th …, 2017 - ieeexplore.ieee.org
… on the network layer, which is represented by its routing protocol for low-power and lossy network (… Therefore, the exposure of RPL to various attacks may lead to network damage. A …
MM Iqbal, A Ahmed, U Khadam - … International Conference on …, 2020 - ieeexplore.ieee.org
… and lossynetworks (RPL), … sinkhole is one of routing attack which can damage network topology. We proposed a method for multisink network topology to detect rank and sinkholeattack…