A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications

Y Kumar, V Kumar - Wireless Personal Communications, 2023 - Springer
The significance of wireless networks is expanding very rapidly, and their increasing
pervasiveness makes them a vital component of the activities involved in living in the …

[HTML][HTML] Machine learning for QoS and security enhancement of RPL in IoT-Enabled wireless sensors

A Wakili, S Bakkali, AEH Alaoui - Sensors International, 2024 - Elsevier
Abstract Internet of Things (IoT) networks rely on wireless sensors for data collection and
transmission, making them vulnerable to security threats that undermine their Quality of …

Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion

HSA Belkhira, M Belkheir, M Rouissat… - Open Information …, 2024 - degruyter.com
The security landscape of Internet of Things (IoT) networks continues to draw significant
attention from recent networks; the Version Number Attack (VNA) stands out as a prominent …

Multiple channel access techniques in industrial IoT: evaluation case of time-slotted channel hopping

A Eloudrhiri Hassani, A Sahel, A Badri, I El Mourabit - Wireless Networks, 2024 - Springer
Abstract The Time Slotted Channel Hopping (TSCH) protocol, defined in the IEEE 802.15. 4
standard, is tailored to meet the stringent communication requirements of industrial …

[HTML][HTML] Optimizing Resource Management for IoT Devices in Constrained Environments

SI Nilima, MK Bhuyan, M Kamruzzaman, J Akter… - Journal of Computer and …, 2024 - scirp.org
Embedded computing device implementation on the Internet of Things (IoT) requires careful
assessment of their intrinsic resource limitations. These constraints are not limited to …

[PDF][PDF] IoBTSec-RPL: A novel RPL attack detecting mechanism using hybrid deep learning over battlefield IoT environment

K Kowsalyadevi, N Balaji - Int. J. Comput. Netw. Appl, 2023 - mail.ijcna.org
The emerging digital world has recently utilized the massive power of the emerging Internet
of Things (IoT) technology that fuels the growth of many intelligent applications. The Internet …

[HTML][HTML] A multi path routing protocol with efficient energy consumption in IoT applications real time traffic

RS Abujassar - EURASIP Journal on Wireless …, 2024 - jwcn-eurasipjournals.springeropen …
The extensive utilization of IoT applications leads to the aggregation of a substantial volume
of data, presenting a crucial challenge in terms of data routing within these networks. RPL …

[HTML][HTML] Improved RAL routing protocol to identify duplicate packets in QoS

TS Sasikala, R Yadav, S Anjana, CR Kumar… - Measurement …, 2022 - Elsevier
The area of study of motion control to Wireless Sensor Networks (WSN) was difficult. This
study examines the problem of vehicular networks in the previously implemented IETF …

[PDF][PDF] Collaborative Detection and Prevention of Sybil Attacks against RPL-Based Internet of Things.

MA Khan, RN Bin Rais, O Khalid - Computers, Materials & …, 2023 - cdn.techscience.cn
ABSTRACT The Internet of Things (IoT) comprises numerous resource-constrained devices
that generate large volumes of data. The inherent vulnerabilities in IoT infrastructure, such …

Hybrid intelligent system for channel allocation and packet transmission in CR-IoT networks

DE Asuquo, UA Umoh, SA Robinson… - … Journal of Hybrid …, 2024 - content.iospress.com
The proliferation of interconnected devices is driving a surge in the demand for wireless
spectrum. Meeting the need for 14 wireless channel access for every device, while also …