[HTML][HTML] A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things

TA Al-Amiedy, M Anbar, B Belaton, AHH Kabla… - Sensors, 2022 - mdpi.com
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6
Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in …

[HTML][HTML] AI-based wormhole attack detection techniques in wireless sensor networks

M Hanif, H Ashraf, Z Jalil, NZ Jhanjhi, M Humayun… - Electronics, 2022 - mdpi.com
The popularity of wireless sensor networks for establishing different communication systems
is increasing daily. A wireless network consists of sensors prone to various security threats …

A cascaded federated deep learning based framework for detecting wormhole attacks in IoT networks

R Alghamdi, M Bellaiche - Computers & Security, 2023 - Elsevier
The growth of the internet over the years has resulted in massive use and spread of the
Internet of Things (IoT) in many areas. From home networks to industrial IoT, from medicine …

Machine learning methods for intrusive detection of wormhole attack in mobile ad hoc network (MANET)

M Abdan, SAH Seno - Wireless Communications and Mobile …, 2022 - Wiley Online Library
A wormhole attack is a type of attack on the network layer that reflects routing protocols. The
classification is performed with several methods of machine learning consisting of K‐nearest …

[PDF][PDF] Intrusion detection systems in internet of things and mobile Ad-Hoc networks.

V Ponnusamy, M Humayun, NZ Jhanjhi… - … Systems Science & …, 2022 - academia.edu
Internet of Things (IoT) devices work mainly in wireless mediums; requiring different
Intrusion Detection System (IDS) kind of solutions to leverage 802.11 header information for …

GITM: A GINI index-based trust mechanism to mitigate and isolate Sybil attack in RPL-enabled smart grid advanced metering infrastructures

M Hassan, N Tariq, A Alsirhani, A Alomari… - IEEE …, 2023 - ieeexplore.ieee.org
The smart grid relies on Advanced Metering Infrastructure (AMI) to function. Because of the
significant packet loss and slow transmission rate of the wireless connection between smart …

[HTML][HTML] Protocol-specific and sensor network-inherited attack detection in IoT using machine learning

F Zahra, NZ Jhanjhi, NA Khan, SN Brohi, M Masud… - Applied Sciences, 2022 - mdpi.com
For networks with limited resources, such as IoT-enabled smart homes, smart industrial
equipment, and urban infrastructures, the Routing Protocol for Low-power and Lossy …

Ensemble feature selection approach for detecting denial of service attacks in RPL networks

TA Alamiedy, MFR Anbar, B Belaton, AH Kabla… - Advances in Cyber …, 2021 - Springer
Abstract The Internet of Things (IoTs) is regarded as a future trend following the Internet
revolution. Many of us now use physical and electronic devices in our daily lives to perform …

A novel Machine learning technique for fake smart watches advertisement detection

A Zaheer, S Tahir, M Humayun… - … and Statistics (MACS …, 2022 - ieeexplore.ieee.org
Fake social media advertisements for items such as smart watches and other types of media
are common and a major subject of concern due to their potential to cause considerable …

[HTML][HTML] A subjective logical framework-based trust model for wormhole attack detection and mitigation in Low-Power and Lossy (RPL) IoT-Networks

S Javed, A Sajid, T Kiren, IU Khan, C Dewi… - Information, 2023 - mdpi.com
The increasing use of wireless communication and IoT devices has raised concerns about
security, particularly with regard to attacks on the Routing Protocol for Low-Power and Lossy …