A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things

TA Al-Amiedy, M Anbar, B Belaton, AA Bahashwan… - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is one of the most rapidly evolving networking concepts,
offering various applications for human benefit. Advances in embedded system architecture …

A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportunities

B Alotaibi - Sensors, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the
Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing …

A subjective logical framework-based trust model for wormhole attack detection and mitigation in Low-Power and Lossy (RPL) IoT-Networks

S Javed, A Sajid, T Kiren, IU Khan, C Dewi… - Information, 2023 - mdpi.com
The increasing use of wireless communication and IoT devices has raised concerns about
security, particularly with regard to attacks on the Routing Protocol for Low-Power and Lossy …

[HTML][HTML] LETM-IoT: A lightweight and efficient trust mechanism for Sybil attacks in Internet of Things networks

J Hassan, A Sohail, AI Awad, MA Zaka - Ad Hoc Networks, 2024 - Elsevier
Abstract The Internet of Things (IoT) has recently gained significance as a means of
connecting various physical devices to the Internet, enabling various innovative …

Ml-based detection of rank and blackhole attacks in RPL networks

PP Ioulianou, VG Vassilakis… - … , Networks and Digital …, 2022 - ieeexplore.ieee.org
Although IoT security is a field studied extensively, recent attacks such as BotenaGo show
that current security solutions cannot effectively stop the spread of IoT attacks. Machine …

Safeguarding the Internet of Things: Elevating IoT routing security through trust management excellence

AW Burange, VM Deshmukh, YA Thakare… - Computer Standards & …, 2025 - Elsevier
This study presents an innovative IoT routing security model that integrates trust
management to bolster network reliability, improve resilience against routing attacks, and …

An Intrusion Detection System using Deep Cellular Learning Automata and Semantic Hierarchy for Enhancing RPL Protocol Security

M Shirafkan, A Shahidinejad, M Ghobaei-Arani - Cluster Computing, 2023 - Springer
The internet of things (IoT) is a collection of systems connected to an online network
consisting of things. Routing Protocol for Low-Power and Lossy Networks (RPL) is a …

[PDF][PDF] Implementing and evaluating a new Silent Rank Attack in RPL-Contiki based IoT networks

M Rouissat, M Belkheir, HSA Belkhira… - Journal of Electrical …, 2023 - sciendo.com
IoT networks are witnessing a rapid growth in various domains of our daily life, offering more
attractive features in terms of measurement accuracy, easy implementation and affordable …

Cooperative IDS for Detecting Collaborative Attacks in RPL-AODV Protocol in Internet of Everything

ES Babu, B Padma, SR Nayak… - Journal of Database …, 2023 - igi-global.com
Internet of everything (IoET) is one of the key integrators in Industry 4.0, which contributes to
large-scale deployment of low-power and lossy (LLN) networks to connecting people …

Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach

H Albinali, F Azzedin - IEEE Transactions on Network and …, 2024 - ieeexplore.ieee.org
The RPL protocol was initially created to connect multiple IP-based communication
applications in low-power and lossy network environments. However, it has become a target …