Assessment of routing attacks and mitigation techniques with RPL control messages: A survey

AO Bang, UP Rao, P Kaliyar, M Conti - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard routing protocol for
the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless …

Effective and efficient DDoS attack detection using deep learning algorithm, multi-layer perceptron

S Ahmed, ZA Khan, SM Mohsin, S Latif, S Aslam… - Future Internet, 2023 - mdpi.com
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and
government agencies. They harm internet businesses, limit access to information and …

Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach

H Albinali, F Azzedin - IEEE Transactions on Network and …, 2024 - ieeexplore.ieee.org
The RPL protocol was initially created to connect multiple IP-based communication
applications in low-power and lossy network environments. However, it has become a target …

A multi class classification for detection of IoT botnet malware

H Chunduri, T Gireesh Kumar, PVS Charan - International conference on …, 2021 - Springer
Botnets are one of the most prevailing threats for cyber-physical devices around the world.
The evolution of botnet attacks has been rampant and diverse with vast scalability. One of …

Securing communications between things against wormhole attacks using TOPSIS decision-making and hash-based cryptography techniques in the IoT ecosystem

T Sahraneshin, R Malekhosseini, F Rad… - Wireless …, 2023 - Springer
Abstract The Internet of Things, also called IoT for short, consists of billions of devices
distributed around the world, all of which are connected through the Internet. Data is …

Energy efficient machine learning based SMART-A-BLE implemented wireless battery management system for both hybrid electric vehicles and battery electric …

S Pannerselvam, VA Narayanan, TG Kumar - Procedia Computer Science, 2023 - Elsevier
Electric vehicles have a larger battery pack with more than 100's cells connected in series or
parallel combinations to form many battery modules. A Battery Management system (BMS) …

Guarding Digital Health: Deep Learning for Attack Detection in Medical IoT

K Vaisakhkrishnan, G Ashok, P Mishra… - Procedia Computer …, 2024 - Elsevier
Abstract The Internet of Medical Things (IoMT) has transformed the healthcare sector by
allowing for the continuous gathering, transfer, and analysis of medical data via networked …

A Multi-class Classification for Detection of IoT Network Attacks Using Machine Learning Models

G Ashok, K Serath, T Gireesh Kumar - International Conference on …, 2024 - Springer
The adoption of IoT devices is growing due to their versatility and simplicity. The number of
security risks associated with these devices has increased as a result of their increased …

Ensemble Techniques for Malicious Threat Detection

KS Raj, K Tej, N Kumar… - … Conference on Inventive …, 2024 - ieeexplore.ieee.org
In the world that we live in today, malware and malicious messages circulate different
systems causing havoc and issues. Hence in a cyber world where social media is prevalent …

Replay Attacks in RPL-Based Internet of Things: Survey and Empirical Comparative Study

H Albinali, F Azzedin - 2023 - researchsquare.com
RPL was developed as a routing protocol in low-power and lossy network contexts to
connect many applications using IP-based communication. However, RPL has been …