Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach

H Albinali, F Azzedin - IEEE Transactions on Network and …, 2024 - ieeexplore.ieee.org
The RPL protocol was initially created to connect multiple IP-based communication
applications in low-power and lossy network environments. However, it has become a target …

Research on Intelligent Network Deception Technology for Attack Trapping

H Yi, R Lin, H Song, L Wang, H Zhou… - … on Computer Simulation …, 2023 - ieeexplore.ieee.org
In the field of network attack, the attacker deceives the target through deception technology,
so as to achieve the purpose of capturing the target object. At present, the research of …

OPSMOTE-ML: an optimized SMOTE with machine learning models for selective forwarding attack detection in low power and lossy networks of internet of things

TA Al-Amiedy, M Anbar, B Belaton - Cluster Computing, 2024 - Springer
Abstract The Internet of Things represents a rapidly evolving networking paradigm that
brings numerous benefits through its diverse applications. Advances in embedded system …

Securing AMI-IoT networks against multiple RPL attacks using ensemble learning IDS and light-chain based prediction detection and mitigation mechanisms

S MM, B PI - Information Security Journal: A Global Perspective, 2024 - Taylor & Francis
ABSTRACT Advanced Metering Infrastructure (AMI) is one of the Internet of Things (IoT)
enabled smart applications of smart grids. The Routing Protocol for Low Power and Lossy …

On reliable and secure RPL (routing protocol low-power and lossy networks) based monitoring and surveillance in oil and gas fields

I Wadhaj - 2022 - napier-repository.worktribe.com
Different efforts have been made to specify protocols and algorithms for the successful
operation of the Internet of things Networks including, for instance, the Low Power and Lossy …