A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things

TA Al-Amiedy, M Anbar, B Belaton, AHH Kabla… - Sensors, 2022 - mdpi.com
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6
Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in …

Deep learning-based reliable routing attack detection mechanism for industrial Internet of Things

S Nayak, N Ahmed, S Misra - Ad Hoc Networks, 2021 - Elsevier
An enormous amount of data processing occurs at the cloud and edge to carry out different
kinds of analytics in Industrial Internet of Things (IIoT). To deal with the analytics using such …

IPv6 routing protocol enhancements over low-power and lossy networks for IoT applications: A systematic review

ME Ekpenyong, DE Asuquo, IJ Udo… - New Review of …, 2022 - Taylor & Francis
Current technology on the use of fifth generation (5 G) networks relies on IPv6 routing
protocol (RPL) for low-power and lossy networks (LLNs). However, the constrained-resource …

Impact analysis of rank attack on RPL-based 6LoWPAN networks in Internet of Things and aftermaths

A Bang, UP Rao - Arabian Journal for Science and Engineering, 2023 - Springer
Routing protocol for low power and lossy networks (RPL) serves the routing process in
Internet Protocol version 6 over low-power wireless personal area network protocol stack …

An ensemble learning framework for the detection of RPL attacks in IoT networks based on the genetic feature selection approach

M Osman, J He, N Zhu, FMM Mokbal - Ad Hoc Networks, 2024 - Elsevier
The rapid proliferation of Internet of Things (IoT) devices has raised critical concerns
regarding the security of corresponding IoT networks. The Routing Protocol for Low-Power …

Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks

M Albishari, M Li, R Zhang, E Almosharea - The Journal of …, 2023 - Springer
Security represents one of the main critical issues in the Internet of Things (IoT), especially
the routing attacks in the core network where the loss of information becomes very harmful …

Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy

N Alfriehat, M Anbar, S Karuppayah, SDA Rihan… - IEEE …, 2024 - ieeexplore.ieee.org
The internet of things (IoT) is an emerging technological advancement with significant
implications. It connects a wireless sensor or node network via low-power and lossy …

Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers

PS Nandhini, S Kuppuswami, S Malliga… - The Journal of …, 2023 - Springer
Abstract Internet of Things (IoT) is becoming a crucial requirement for linking numerous
physical devices or gadgets to the web. Due to large volume of data exchanged, security in …

Secured location-aware mobility-enabled RPL

E Arvan, MKH Dehkordi, S Jalili - Journal of Network and Computer …, 2023 - Elsevier
Although there have been many studies on the Internet of Things (IoT), there are still major
challenges for IoT to become ubiquitous. So far, the mobility management challenge has not …

[PDF][PDF] Enhancing iot security with deep stack encoder using various optimizers for botnet attack prediction

A Kalidindi, MB Arrama - … Journal of Advanced Computer Science and …, 2023 - academia.edu
The Internet of Things (IoT) connects different sensors, devices, applications, databases,
services, and people, bringing improvements to various aspects of our lives, such as cities …