A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches

SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and
exchange data. These “things” can be sensors, actuators, smartphones, wearables …

Trust and mobility-based protocol for secure routing in Internet of Things

SM Muzammal, RK Murugesan, NZ Jhanjhi… - Sensors, 2022 - mdpi.com
In the Internet of Things (IoT), the de facto Routing Protocol for Low Power and Lossy
Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and …

SMTrust: Proposing trust-based secure routing protocol for RPL attacks for IoT applications

SM Muzammal, RK Murugesan… - 2020 International …, 2020 - ieeexplore.ieee.org
With large scale generation and exchange of data between IoT devices and constrained IoT
security to protect data communication, it becomes easy for attackers to compromise data …

A cryptographic approach to prevent network incursion for enhancement of QoS in sustainable smart city using MANET

S Singh, A Pise, O Alfarraj, A Tolba, B Yoon - Sustainable Cities and …, 2022 - Elsevier
A city-wide communication network capable of supporting a range of applica-tions should be
established through the use of wireless sensor networks that collect, analyze, and act on …

Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks

KH Mohammadani, KA Memon… - International …, 2020 - journals.sagepub.com
Mobile ad hoc networks are the “spontaneous networks” which create a temporary network
in any place and any time without using any extra fixed radio device of a full infrastructure …

Trust-based Approaches Towards Enhancing IoT Security: A Systematic Literature Review

O Okporokpo, F Olajide, N Ajienka, X Ma - arXiv preprint arXiv:2311.11705, 2023 - arxiv.org
The continuous rise in the adoption of emerging technologies such as Internet of Things
(IoT) by businesses has brought unprecedented opportunities for innovation and growth …

Intelligent route discovery towards rushing attacks in ad hoc wireless networks

U Allimuthu, K Mahalakshmi - Journal of Ambient Intelligence and …, 2022 - Springer
MANET (mobile ad-hoc networks) are distributed or delegated away from a central server,
authoritative location of wireless networks that communicate without pre-existing structure …

A novel implicit trust recommendation approach for rating prediction

Y Li, J Liu, J Ren, Y Chang - IEEE Access, 2020 - ieeexplore.ieee.org
Rating predictions, as an application that is widely used in recommender systems, have
gradually become a valuable way which can help user narrow down their choices quickly …

Identifying and detecting black hole and gray hole attack in MANET using gray wolf optimization

R Vatambeti, KS Supriya… - International Journal of …, 2020 - Wiley Online Library
Mobile ad hoc networks (MANETs) become most vibrant and are widely used in various
applications, including military, commercial sectors, and personal area networks. However …

Black hole attack detection using Dolphin Echo-location-based machine learning model in MANET environment

R Vatambeti, SV Mantena, KVD Kiran… - Computers and …, 2024 - Elsevier
Mobile ad hoc networks have surged in popularity in recent years and are now widely
regarded as critically important due to their low complexity and quick expansion. However, a …