DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN

VR Rajasekar, S Rajkumar - Cluster Computing, 2024 - Springer
The RPL routing protocol is susceptible to Selective Forwarding Attack (SFA), wherein
malicious nodes selectively forward certain packets while discarding others and isolating a …

A trust-based intrusion detection system for RPL networks: Detecting a combination of rank and blackhole attacks

PP Ioulianou, VG Vassilakis… - Journal of Cybersecurity …, 2022 - mdpi.com
Routing attacks are a major security issue for Internet of Things (IoT) networks utilising
routing protocols, as malicious actors can overwhelm resource-constrained devices with …

[PDF][PDF] Direct Neighbour Sink Reputed Trust Based Intrusion Detection System to Mitigate Sinkhole Attack in RPL for IoT Networks.

B Patel, P Shah - Journal of Engineering Science & Technology …, 2021 - academia.edu
In terms of heterogeneous devices and sensors, man and machine collaborate seamlessly,
giving birth to the Internet of People, Internet of Things, and Internet of the Future. IoT …

Artificial intelligence-based technique for detection of selective forwarding attack in rpl-based internet of things networks

V Neerugatti, A Rama Mohan Reddy - Emerging Research in Data …, 2020 - Springer
Abstract Internet of Things (IoT) is an upcoming technology in computing networks, which
uses the novel and constrained technologies like IPv6 over Low-powered wireless personal …

RPL-based IoT networks under simple and complex routing security attacks: An experimental study

IS Alsukayti, M Alreshoodi - Applied Sciences, 2023 - mdpi.com
Effective security support still remains a challenge even for a standardized Internet of Things
network protocol such as the IPv6 Routing Protocol for Low-Power and Lossy Networks …

Simulation-based Analysis of RPL Routing Attacks and Their Impact on IoT Network Performance

R Bokka, T Sadasivam - Journal of Electronic Testing, 2024 - Springer
The recent expansion of the Internet of Things (IoT) owes a lot to the significant contribution
of the 6LoWPAN protocol, which has been extensively employed in low-power and lossy …

[PDF][PDF] Routing Attacks Detection in 6LoWPAN-Based Internet of Things. Electronics 2023, 12, 1320

A Alazab, A Khraisat, S Singh, S Bevinakoppa… - 2023 - academia.edu
The Internet of Things (IoT) has become increasingly popular, and opened new possibilities
for applications in various domains. However, the IoT also poses security challenges due to …

Assessment of routing attacks and mitigation techniques with RPL control messages: A survey

AO Bang, UP Rao, P Kaliyar, M Conti - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard routing protocol for
the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless …

Forwarding Neighbor Based Sink Reputed Trust Based Intrusion Detection System to Mitigate Selective Forwarding Attack in RPL for IoT Networks

B Patel, J Vasa, P Shah - SN Computer Science, 2023 - Springer
The physical world and information world communicate giving birth to the Internet of Things
firstly coined by Kevin Ashton in 1999. But actual growth momentum of IoT has picked up the …

Mitigating the worst parent attack in RPL based internet of things

R Sahay, G Geethakumari, B Mitra - Cluster Computing, 2022 - Springer
Abstract The Low Power and Lossy Networks (LLNs) in the Internet of Things environment
comprising constrained embedded devices have particular routing requirements that are …