[HTML][HTML] A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things

TA Al-Amiedy, M Anbar, B Belaton, AHH Kabla… - Sensors, 2022 - mdpi.com
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6
Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in …

Machine learning enabled Industrial IoT Security: Challenges, Trends and Solutions

C Ni, SC Li - Journal of Industrial Information Integration, 2024 - Elsevier
Abstract Introduction: The increasingly integrated Industrial IoT (IIoT) with industrial systems
brings benefits such as intelligent analytics, predictive maintenance, and remote monitoring …

QSec-RPL: Detection of version number attacks in RPL based mobile IoT using Q-Learning

G Sharma, J Grover, A Verma - Ad Hoc Networks, 2023 - Elsevier
Abstract Internet of Things (IoT) has revolutionized the networking by connecting the real
world entities to the Internet. IoT connects the communication devices and has an incredible …

Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy

N Alfriehat, M Anbar, S Karuppayah, SDA Rihan… - IEEE …, 2024 - ieeexplore.ieee.org
The internet of things (IoT) is an emerging technological advancement with significant
implications. It connects a wireless sensor or node network via low-power and lossy …

An ensemble learning framework for the detection of RPL attacks in IoT networks based on the genetic feature selection approach

M Osman, J He, N Zhu, FMM Mokbal - Ad Hoc Networks, 2024 - Elsevier
The rapid proliferation of Internet of Things (IoT) devices has raised critical concerns
regarding the security of corresponding IoT networks. The Routing Protocol for Low-Power …

Faulty Node Detection in HDFS Using Machine Learning Techniques.

RS Gaykar, V Khanaa, SD Joshi - Revue d'Intelligence …, 2022 - search.ebscohost.com
The design of Hadoop has ability to elimination of fault tolerance, which consists of
rescheduling the task on the defective nodes to run on other devices in the system …

Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach

H Albinali, F Azzedin - IEEE Transactions on Network and …, 2024 - ieeexplore.ieee.org
The RPL protocol was initially created to connect multiple IP-based communication
applications in low-power and lossy network environments. However, it has become a target …

An intrusion detection system for the internet of things using machine learning models

G Guo - 2022 3rd International Conference on Big Data …, 2022 - ieeexplore.ieee.org
The growing applications of the Internet of Things (IoT) technologies have led to enormous
security problems. Since Intrusion Detection Systems (IDSs) based on Machine Learning …

Blackhole Attack Prediction in Wireless Sensor Networks Using Support Vector Machine

N Panda, M Supriya - Advances in Signal Processing, Embedded Systems …, 2023 - Springer
One of the most pressing concerns in the Internet of Things (IoT) is security. The majority of
IoT deployments rely on the creation of a wireless sensor network (WSN), which builds Low …

A top-down survey on securing IoT with machine learning: goals, recent advances and challenges

S Iqbal, S Qureshi - International Journal of Wireless and …, 2022 - inderscienceonline.com
The Internet of Things (IoT) has seen it all from being just another innovation to a leading
technology; it is now a binding force that interconnects various aspects of our lives. The IoT's …