A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things

TA Al-Amiedy, M Anbar, B Belaton, AA Bahashwan… - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is one of the most rapidly evolving networking concepts,
offering various applications for human benefit. Advances in embedded system architecture …

Li-MSD: A lightweight mitigation solution for DAO insider attack in RPL-based IoT

A Verma, SK Verma, AC Pandey, J Grover… - Future Generation …, 2024 - Elsevier
Many IoT applications run on a wireless infrastructure supported by resource-constrained
nodes which is popularly known as Low-Power and Lossy Networks (LLNs). Currently, LLNs …

Challenges in Blockchain as a Solution for IoT Ecosystem Threats and Access Control: A Survey

SC Avik, S Biswas, MAR Ahad, Z Latif… - arXiv preprint arXiv …, 2023 - arxiv.org
The Internet of Things (IoT) is increasingly influencing and transforming various aspects of
our daily lives. Contrary to popular belief, it raises security and privacy issues as it is used to …

A Lightweight Mitigation Approach for Addressing DDAO Attacks in RPL-based Internet of Things

S Goel, A Verma, VK Jain - Proceedings of the 2023 Fifteenth …, 2023 - dl.acm.org
There are many Internet of Things (IoT) applications which demand an infrastructure that
requires significantly less energy and supports longer operation time. Such an infrastructure …

A Defense Solution to Secure Low-Power and Lossy Networks Against DAO Insider Attacks

AK Prajapati, ES Pilli, RB Battula… - TENCON 2023-2023 …, 2023 - ieeexplore.ieee.org
The Low-Power and Lossy Network (LLN) is the most important building block in the Internet
of Things (IoT), comprising numerous tiny sensor nodes connected together. The Routing …

CGBA: A Efficient Insider Attacker Detection Technique in Machine Learning

K Nandini, GS Girisha, S Reddy - … International Conference on …, 2024 - ieeexplore.ieee.org
Data security is one of the most space to researchers for provide the security to the sensitive
data in 2024. The aim of the attacker is to steal the confidential data, attacker are using new …