A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things

TA Al-Amiedy, M Anbar, B Belaton, AHH Kabla… - Sensors, 2022 - mdpi.com
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6
Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in …

A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things

TA Al-Amiedy, M Anbar, B Belaton, AA Bahashwan… - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is one of the most rapidly evolving networking concepts,
offering various applications for human benefit. Advances in embedded system architecture …

Compatible Authentication and Key Agreement Protocol for Low Power and Lossy Network in Iot Environment.

A Peivandizadeh, B Molavi - Available at SSRN 4454407, 2023 - papers.ssrn.com
Abstract Today, the Internet of Things can be described as the fastest-growing network that
offers applications in a wide range of applications. This breadth has led to a wide range of …

Assessment of routing attacks and mitigation techniques with RPL control messages: A survey

AO Bang, UP Rao, P Kaliyar, M Conti - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard routing protocol for
the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless …

A reputation‐based RPL protocol to detect selective forwarding attack in Internet of Things

A Patel, D Jinwala - International Journal of Communication …, 2022 - Wiley Online Library
Summary Internet of Things (IoT) is an internet of smart objects where smart objects
communicate with each other. IoT objects are deployed in open medium with dynamic …

Mitigating the worst parent attack in RPL based internet of things

R Sahay, G Geethakumari, B Mitra - Cluster Computing, 2022 - Springer
Abstract The Low Power and Lossy Networks (LLNs) in the Internet of Things environment
comprising constrained embedded devices have particular routing requirements that are …

Security challenges of selective forwarding attack and design a secure ECDH-based authentication protocol to improve RPL security

HY Adarbah, MF Moghadam, RLR Maata… - IEEE …, 2022 - ieeexplore.ieee.org
Today, we could describe the Internet of Things (loT) as the pervasive and global network
that provides a system for monitoring, controlling, processing, and analyzing the data …

OPSMOTE-ML: an optimized SMOTE with machine learning models for selective forwarding attack detection in low power and lossy networks of internet of things

TA Al-Amiedy, M Anbar, B Belaton - Cluster Computing, 2024 - Springer
Abstract The Internet of Things represents a rapidly evolving networking paradigm that
brings numerous benefits through its diverse applications. Advances in embedded system …

Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach

H Albinali, F Azzedin - IEEE Transactions on Network and …, 2024 - ieeexplore.ieee.org
The RPL protocol was initially created to connect multiple IP-based communication
applications in low-power and lossy network environments. However, it has become a target …

Utilization of Deep Learning Models for Safe Human‐Friendly Computing in Cloud, Fog, and Mobile Edge Networks

DMR Tudesco, A Deshpande… - … Analytics and Cyber …, 2024 - Wiley Online Library
Deep learning (DL) involves a multi‐level layer model that uses the output from one layer as
input to another. Unsupervised learning automatically learns handy features and conveys …