Congestion aware algorithm using fuzzy logic to find an optimal routing path for IoT networks

J Shreyas, H Singh, J Bhutani, S Pandit… - 2019 International …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is a rapidly expanding technology that has recently got significant
recognition in the field of studies. In IoT networks, huge traffic in network causes congestion …

Effective modelling of sinkhole detection algorithm for edge‐based Internet of Things (IoT) sensing devices

A Bilal, SMN Hasany, AH Pitafi - IET Communications, 2022 - Wiley Online Library
The sinkhole attacks for Internet of Things (IoT) situations can overcome the network and
interrupt communication. Sinkhole attacker nodes can advertise the best possible shortest …

A Novel Detection and Localization Scheme for Wormhole Attack in the Internet of Things

F Tong, C Chen, J Pan - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
With the explosive growth of Internet of Things (IoT) devices, the IPv6 routing protocol for low-
power and lossy networks (RPL) has been widely studied and applied. However, due to lack …

CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis

A Verma, V Ranga - Telecommunication Systems, 2020 - Springer
The IPv6 routing protocol for low-power and lossy networks (RPL) is the standard routing
protocol for IPv6 based low-power wireless personal area networks (6LoWPANs). In RPL …

Effect of DIS attack on 6TiSCH network formation

A Kalita, A Brighente, M Khatua… - IEEE Communications …, 2022 - ieeexplore.ieee.org
The 6TiSCH standard provides minimum latency and reliability in mission-critical IoT
applications. To optimize resource allocation during 6TiSCH network formation, IETF …

Hybrid mode of operations for rpl in iot: A systematic survey

AK Mishra, O Singh, A Kumar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
RPL (Routing Protocol for Low-Power and Lossy Networks) is a crucial and widely accepted
routing protocol of the Internet of Things (IoT). RPL constructs similar to a tree structure for …

Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks

M Albishari, M Li, R Zhang, E Almosharea - The Journal of …, 2023 - Springer
Security represents one of the main critical issues in the Internet of Things (IoT), especially
the routing attacks in the core network where the loss of information becomes very harmful …

[PDF][PDF] RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things

Z Alansari, NB Anuar, A Kamsin, MR Belgaum - PeerJ Computer Science, 2023 - peerj.com
Routing protocols transmit vast amounts of sensor data between the Wireless Sensor
Network (WSN) and the Internet of Things (IoT) gateway. One of these routing protocols is …

Design and countermeasure of optimal cyber-routing attack on remote Kalman filter in stochastic microgrids

Y Song, D Ye - Information Sciences, 2023 - Elsevier
This paper addresses security issues of remote Kalman filter in stochastic microgrids. Smart
sensors package data from the phase measurement unit and send it to a remote estimator …

Ensemble feature selection approach for detecting denial of service attacks in RPL networks

TA Alamiedy, MFR Anbar, B Belaton, AH Kabla… - Advances in Cyber …, 2021 - Springer
Abstract The Internet of Things (IoTs) is regarded as a future trend following the Internet
revolution. Many of us now use physical and electronic devices in our daily lives to perform …