A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things

TA Al-Amiedy, M Anbar, B Belaton, AA Bahashwan… - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is one of the most rapidly evolving networking concepts,
offering various applications for human benefit. Advances in embedded system architecture …

Survey on IoT: security threats and applications

I Ahmad, MS Niazy, RA Ziar, S Khan - Journal of Robotics and …, 2021 - journal.umy.ac.id
Abstract the rapid growth of the internet of things (IoT) in the world in recent years is due to
its wide range of usability, adaptability, and smartness. Most of the IoT applications are …

A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest–RFTRUST

K Prathapchandran, T Janani - Computer Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) plays a vital role in many application domains like
battlefield surveillance, wildlife monitoring, disaster response, medical care, transportation …

A comprehensive survey on detection of sinkhole attack in routing over low power and Lossy network for internet of things

AARA Omar, B Soudan - Internet of Things, 2023 - Elsevier
Abstract The Internet of things (IoT) is a developing technology that has produced
remarkable advancements and contributions in numerous applications. IoT refers to a …

Security aspects for RPL-based protocols: A systematic review in IoT

K Avila, D Jabba, J Gomez - Applied Sciences, 2020 - mdpi.com
The Internet of things (IoT) is a concept that has gained traction over the last decade. IoT
networks have evolved around the wireless sensor network (WSN), and the following …

Sinkhole attack in multi-sink paradigm: detection and performance evaluation in RPL based IoT

MM Iqbal, A Ahmed, U Khadam - … International Conference on …, 2020 - ieeexplore.ieee.org
Internet of things (IoT) is an imminent technological platform to overcome social and
economic challenges. IoT devices are connected through internet technology using lossy …

A decentralized method for detecting clone ID attacks on the Internet of Things

SR Taghanaki, SB Arzandeh… - 2021 5th International …, 2021 - ieeexplore.ieee.org
One of the attacks in the RPL protocol is the Clone ID attack, that the attacker clones the
node's ID in the network. In this research, a Clone ID detection system is designed for the …

[PDF][PDF] Blackhole attacks in internet of things networks: a review

NH Kamis, W Yassin, MF Abdollah… - Indonesian Journal of …, 2023 - academia.edu
The internet of things (IoT) is one of data revolution area and is the following extraordinary
mechanical jump after the internet. In terms of IoT, it is expected that electronic gadgets that …

Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach

H Albinali, F Azzedin - IEEE Transactions on Network and …, 2024 - ieeexplore.ieee.org
The RPL protocol was initially created to connect multiple IP-based communication
applications in low-power and lossy network environments. However, it has become a target …

Enhancement of accuracy of the Rank Inconsistency Detection Algorithm

A Mujtaba, A Rafiq, S Amjad, A Mubarik… - Pakistan Journal of …, 2022 - journal.uet.edu.pk
Devices used for Internet of Things (IoT) are lacking in resources, and they are susceptible
to many attacks that the internet provides a pathway. These devices are connected to the …