Proposing a secure RPL based internet of things routing protocol: a review

ZA Almusaylim, A Alhumam, NZ Jhanjhi - Ad Hoc Networks, 2020 - Elsevier
Abstract Nowadays, the Internet of Things (IoT) research domain attracts the researchers,
due to its extensive collection of applications and ease in deploying in several domains of …

PriNergy: A priority-based energy-efficient routing method for IoT systems

F Safara, A Souri, T Baker, I Al Ridhawi… - The Journal of …, 2020 - Springer
Abstract The Internet of Things (IoT) devices gather a plethora of data by sensing and
monitoring the surrounding environment. Transmission of collected data from the IoT …

[HTML][HTML] Wireless sensor networks: Active and passive attacks-vulnerabilities and countermeasures

M Keerthika, D Shanmugapriya - Global Transitions Proceedings, 2021 - Elsevier
Wireless sensor network has attracted significant attention in research and development due
to its tremendous applications in medical, military and defence, medical, environmental …

Blockchain technology for the industrial Internet of Things: A comprehensive survey on security challenges, architectures, applications, and future research directions

S Latif, Z Idrees, Z e Huma… - Transactions on Emerging …, 2021 - Wiley Online Library
The blockchain has emerged as an innovative and powerful technology that shows the
tremendous potential to enhance the smart industrial frameworks by providing encryption …

MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications

A Seyfollahi, M Moodi, A Ghaffari - Computer Standards & Interfaces, 2022 - Elsevier
The intricate features and autonomous configuration of Routing Protocol for Low-power and
Lossy Networks (RPL) make it challenging to provide a key management solution and …

Ietf 6tisch: A tutorial

X Vilajosana, T Watteyne, T Chang… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The IETF IPv6 over the TSCH mode of IEEE802. 15.4 e (6TiSCH) working group has
standardized a set of protocols to enable low power industrial-grade IPv6 networks. 6TiSCH …

An iot inventory before deployment: a survey on iot protocols, communication technologies, vulnerabilities, attacks, and future research directions

AO Bang, UP Rao, A Visconti, A Brighente, M Conti - Computers & Security, 2022 - Elsevier
Abstract The Internet of Things (IoT) is a pervasive phenomenon in our everyday life, binding
and enabling communication between heterogeneous physical devices and the internet …

A review of security and privacy concerns in the internet of things (IoT)

M Aqeel, F Ali, MW Iqbal, TA Rana, M Arif… - Journal of …, 2022 - Wiley Online Library
The recent two decades have witnessed tremendous growth in Internet of things (IoT)
applications. There are more than 50 billion devices connected globally. IoT applications' …

[HTML][HTML] Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP

Z A. Almusaylim, NZ Jhanjhi, A Alhumam - Sensors, 2020 - mdpi.com
The rapid growth of the Internet of Things (IoT) and the massive propagation of wireless
technologies has revealed recent opportunities for development in various domains of real …

Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication

K Mabodi, M Yusefi, S Zandiyan, L Irankhah… - The journal of …, 2020 - Springer
The internet of things (IoT) is able to provide a prediction of linked, universal, and smart
nodes that have autonomous interaction when they present services. Because of wide …