A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things

TA Al-Amiedy, M Anbar, B Belaton, AA Bahashwan… - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is one of the most rapidly evolving networking concepts,
offering various applications for human benefit. Advances in embedded system architecture …

Efficient secure routing mechanisms for the low-powered IoT network: A literature review

MZ Hussain, ZM Hanapi - Electronics, 2023 - mdpi.com
The Wireless Sensor Network in the Internet of Things (WSN-IoT) has been flourishing as
another global breakthrough over the past few years. The WSN-IoT is reforming the way we …

A fuzzy logic-based secure hierarchical routing scheme using firefly algorithm in Internet of Things for healthcare

M Hosseinzadeh, J Yoo, S Ali, J Lansky, S Mildeova… - Scientific Reports, 2023 - nature.com
Abstract The Internet of Things (IoT) is a universal network to supervise the physical world
through sensors installed on different devices. The network can improve many areas …

A cluster-tree-based secure routing protocol using dragonfly algorithm (DA) in the Internet of Things (IoT) for smart agriculture

M Hosseinzadeh, J Tanveer, A Masoud Rahmani… - Mathematics, 2022 - mdpi.com
The Internet of Things defines a global and comprehensive network whose task is to monitor
and control the physical world by collecting, processing, and analyzing data sensed by IoT …

RM-RPL: reliable mobility management framework for RPL-based IoT systems

A Seyfollahi, M Mainuddin, T Taami, A Ghaffari - Cluster Computing, 2024 - Springer
This paper represents the Reliable Mobility Management of RPL (RM-RPL) protocol,
specifically developed to overcome the limitations of the Routing Protocol for Low-Power …

MCTE-RPL: A Multi-Context Trust-based Efficient RPL for IoT

J Mohajerani, MM Ghanatghestani… - Journal of Network and …, 2024 - Elsevier
Abstract The Internet of things (IoT) is highly exposed to various attacks due to its sensitive
applications, but it is very vulnerable in dealing with these attacks. So, various studies have …

Edge caching for mobile devices

MR Azeem, SM Muzammal, N Zaman… - … Computer Science and …, 2022 - ieeexplore.ieee.org
The volume of the network traffic is increasing exponentially. Several smart devices and
mobile applications are being widely used, thus placing a heavy pressure on backhaul lines …

A comprehensive analysis on trust based secure routing protocol used in internet of things (iots)

BM Shruthi, C Raju - 2023 International Conference on Applied …, 2023 - ieeexplore.ieee.org
Internet of Things (IoTs) is dynamic wireless network developed by utilizing the wireless
nodes and that promises several benefits to the user. The important features of IoTs are less …

Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach

H Albinali, F Azzedin - IEEE Transactions on Network and …, 2024 - ieeexplore.ieee.org
The RPL protocol was initially created to connect multiple IP-based communication
applications in low-power and lossy network environments. However, it has become a target …

PathGuard: Trustworthy Routing for Sustainable and Secure IoT-WSN Networks

N Kumar, S Sharma - Wireless Personal Communications, 2024 - Springer
With the rise in technology especially the integration of internet of Things (IoT) with Wireless
Sensor Networks (WSNs) an extensive network of interconnected devices and sensors is …