A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things

TA Al-Amiedy, M Anbar, B Belaton, AHH Kabla… - Sensors, 2022 - mdpi.com
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6
Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in …

[PDF][PDF] Internet of things based wireless sensor network: a review

SW Nourildean, MD Hassib… - Indones. J. Electr. Eng …, 2022 - researchgate.net
Recently, internet of things (IoT) technologies are developing technology with a variety of
applications. The IoT is defined as a network of ordinary objects such as Internet TVs …

An integrated exploration on internet of things and wireless sensor networks

S Sharma, VK Verma - Wireless Personal Communications, 2022 - Springer
The ability to access data from remote locations is meant possible with the help of computer
networks. These networks may be wired or wireless. Modern improvements in wireless …

DDoS attack and detection methods in internet-enabled networks: Concept, research perspectives, and challenges

KB Adedeji, AM Abu-Mahfouz, AM Kurien - Journal of Sensor and …, 2023 - mdpi.com
In recent times, distributed denial of service (DDoS) has been one of the most prevalent
security threats in internet-enabled networks, with many internet of things (IoT) devices …

A multi-level random forest model-based intrusion detection using fuzzy inference system for internet of things networks

JB Awotunde, FE Ayo, R Panigrahi, A Garg… - International Journal of …, 2023 - Springer
Intrusion detection (ID) methods are security frameworks designed to safeguard network
information systems. The strength of an intrusion detection method is dependent on the …

Investigations on information solicitation and version number attacks in internet of things

VK Verma, S Sharma - IEEE Sensors Journal, 2022 - ieeexplore.ieee.org
Self-organizing maps (SOMs) have been widely known for resolving a variety of detection
and classification problems. It is a special kind of machine learning technique that sorts out …

Security‐Aware Routing Protocol Based on Artificial Neural Network Algorithm and 6LoWPAN in the Internet of Things

J Lu, D Li, P Wang, F Zheng… - … and Mobile Computing, 2022 - Wiley Online Library
Today, with increasing information technology such as the Internet of Things (IoT) in human
life, interconnection and routing protocols need to find optimal solution for safe data …

Catenarian-trim medley routing system for energy balancing in dispensed computing networks

VK Verma, A Sharma, K Ntalianis… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Balancing energy consumption to prolong the life of a dispensed computing network is a
challenging issue for researchers. In multi-hop transmission, most of the sensor node energy …

Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks

M Albishari, M Li, R Zhang, E Almosharea - The Journal of …, 2023 - Springer
Security represents one of the main critical issues in the Internet of Things (IoT), especially
the routing attacks in the core network where the loss of information becomes very harmful …

Smart city vehicle accident monitoring and detection system using (MEMS, GSM, GPS) raspberry Pi 4

A Kumar, MAK Akhtar, A Pandey… - IETE Journal of …, 2023 - Taylor & Francis
This study is focused on the concept of the Internet of Things (IoT)-based smart city model on
Raspberry Pi. It assesses the design and implementation of a smart city based on the …