A review of security and privacy concerns in the internet of things (IoT)

M Aqeel, F Ali, MW Iqbal, TA Rana, M Arif… - Journal of …, 2022 - Wiley Online Library
The recent two decades have witnessed tremendous growth in Internet of things (IoT)
applications. There are more than 50 billion devices connected globally. IoT applications' …

A review on the security of IoT networks: From network layer's perspective

A Jahangeer, SU Bazai, S Aslam, S Marjan… - IEEE …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) has revolutionized the world in the last decade. Today millions of
devices are connected to each other utilizing IoT technology in one way or the other. With …

CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities

AK Sangaiah, A Javadpour, F Ja'fari, P Pinto… - Microprocessors and …, 2022 - Elsevier
This research aims to represent a novel approach to detect malicious nodes in Ad-hoc On-
demand Distance Vector (AODV) within the next-generation smart cities. Smart city …

A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem

M Zaminkar, F Sarkohaki… - International Journal of …, 2021 - Wiley Online Library
Summary Internet of Things (IoT) provides the possibility for milliards of devices throughout
the world to communicate with each other, and data are collected autonomously. The big …

Sinkhole attack in multi-sink paradigm: detection and performance evaluation in RPL based IoT

MM Iqbal, A Ahmed, U Khadam - … International Conference on …, 2020 - ieeexplore.ieee.org
Internet of things (IoT) is an imminent technological platform to overcome social and
economic challenges. IoT devices are connected through internet technology using lossy …

Securing smart home against sinkhole attack using weight‐based IDS placement strategy

MS Islam, M Tasnim, U Kabir… - IET Wireless Sensor …, 2023 - Wiley Online Library
Extensive use of the Internet of Things (IoT) in smart homes makes users' lives easy and
comfortable. Yet, these resource‐constrained devices are prone to manifold security attacks …

Surveying Strategies: Detecting Sinkhole Attacks in IoT Networks

SH Shanthini, C Sheeba Joice - International Conference on …, 2023 - Springer
In the IoT sphere, sinkhole attacks pose serious threats to the network layer, risking both its
integrity and security. These attacks reroute network traffic to an unauthorized node …

Biomedical big data in patient-centered healthcare services and personalized clinical care

D Thompson - American Journal of Medical Research, 2020 - ceeol.com
This paper analyzes the outcomes of an exploratory review of the current research on
biomedical big data in patient-centered healthcare services and personalized clinical care …

A Comprehensive Review on Security Attacks and Countermeasures in IoT Environment

S Walling, S Lodh - … on Information and Communication Technology for …, 2022 - Springer
Abstract The Internet of Things (IoT) is a network of “physical objects” or “things” integrated
with sensors, software, and other technologies that connect to and exchange data with other …

[PDF][PDF] Sinkhole Detection Using Probe Route Mechanism (SDPRM) For Internet of Things

C Linda Hepsiba… - Indian Journal …, 2022 - sciresol.s3.us-east-2.amazonaws …
Abstract Objective: To propose an Intrusion Detection System, called SDPRM (Sinkhole
Detection using Probe Route Mechanism), to distinguish sinkhole assaults on the steering …