A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things

TA Al-Amiedy, M Anbar, B Belaton, AA Bahashwan… - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is one of the most rapidly evolving networking concepts,
offering various applications for human benefit. Advances in embedded system architecture …

A comprehensive survey on detection of sinkhole attack in routing over low power and Lossy network for internet of things

AARA Omar, B Soudan - Internet of Things, 2023 - Elsevier
Abstract The Internet of things (IoT) is a developing technology that has produced
remarkable advancements and contributions in numerous applications. IoT refers to a …

Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach

H Albinali, F Azzedin - IEEE Transactions on Network and …, 2024 - ieeexplore.ieee.org
The RPL protocol was initially created to connect multiple IP-based communication
applications in low-power and lossy network environments. However, it has become a target …

A Research Survey on Security Enhancement in WSN-based IoT Applications

VV Bhandiwad, LK Ragha - 2023 10th International …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is a contemporary technology that makes it possible to connect
physical and digital devices. The Wireless Sensor Network is a substantial wireless network …

Surveying Strategies: Detecting Sinkhole Attacks in IoT Networks

SH Shanthini, C Sheeba Joice - International Conference on …, 2023 - Springer
In the IoT sphere, sinkhole attacks pose serious threats to the network layer, risking both its
integrity and security. These attacks reroute network traffic to an unauthorized node …

Application of PSO-FCM Intelligent Algorithm in Computer Network Data Detection

J Zhou - … on Cognitive based Information Processing and …, 2022 - Springer
With the rapid development of the Internet, the era of information intelligence has increased
the opportunities for malicious personnel to leak data and conduct network attacks, and …