A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things

TA Al-Amiedy, M Anbar, B Belaton, AA Bahashwan… - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is one of the most rapidly evolving networking concepts,
offering various applications for human benefit. Advances in embedded system architecture …

[HTML][HTML] Trust and mobility-based protocol for secure routing in Internet of Things

SM Muzammal, RK Murugesan, NZ Jhanjhi… - Sensors, 2022 - mdpi.com
In the Internet of Things (IoT), the de facto Routing Protocol for Low Power and Lossy
Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and …

[HTML][HTML] A trust-based model for secure routing against RPL attacks in internet of things

SM Muzammal, RK Murugesan, NZ Jhanjhi… - Sensors, 2022 - mdpi.com
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is
vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …

Impact analysis of rank attack on RPL-based 6LoWPAN networks in Internet of Things and aftermaths

A Bang, UP Rao - Arabian Journal for Science and Engineering, 2023 - Springer
Routing protocol for low power and lossy networks (RPL) serves the routing process in
Internet Protocol version 6 over low-power wireless personal area network protocol stack …

[HTML][HTML] A lightweight mitigation approach against a new inundation attack in RPL-based IoT networks

M Rouissat, M Belkheir, IS Alsukayti, A Mokaddem - Applied Sciences, 2023 - mdpi.com
Internet of Things (IoT) networks are being widely deployed for a broad range of critical
applications. Without effective security support, such a trend would open the doors to …

Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach

H Albinali, F Azzedin - IEEE Transactions on Network and …, 2024 - ieeexplore.ieee.org
The RPL protocol was initially created to connect multiple IP-based communication
applications in low-power and lossy network environments. However, it has become a target …

Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers

PS Nandhini, S Kuppuswami, S Malliga… - The Journal of …, 2023 - Springer
Abstract Internet of Things (IoT) is becoming a crucial requirement for linking numerous
physical devices or gadgets to the web. Due to large volume of data exchanged, security in …

[HTML][HTML] LETM-IoT: A lightweight and efficient trust mechanism for Sybil attacks in Internet of Things networks

J Hassan, A Sohail, AI Awad, MA Zaka - Ad Hoc Networks, 2024 - Elsevier
Abstract The Internet of Things (IoT) has recently gained significance as a means of
connecting various physical devices to the Internet, enabling various innovative …

Li-MSD: A lightweight mitigation solution for DAO insider attack in RPL-based IoT

A Verma, SK Verma, AC Pandey, J Grover… - Future Generation …, 2024 - Elsevier
Many IoT applications run on a wireless infrastructure supported by resource-constrained
nodes which is popularly known as Low-Power and Lossy Networks (LLNs). Currently, LLNs …

CRA-RPL: A Novel Lightweight challenge-Response authentication-based technique for securing RPL against dropped DAO attacks

S Goel, A Verma, VK Jain - Computers & Security, 2023 - Elsevier
Abstract IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) is one of the
most prominent networking technologies currently fueling the drastic growth of the Internet of …