A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches

SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and
exchange data. These “things” can be sensors, actuators, smartphones, wearables …

[PDF][PDF] A data driven trust mechanism based on blockchain in IoT sensor networks for detection and mitigation of attacks

D Sivaganesan - Journal of trends in Computer Science and …, 2021 - scholar.archive.org
Utilization of smart applications in various domains is facilitated pervasively by sensor nodes
(SN) that are connected in a wireless manner and a number of smart things. Hazards due to …

Oppositional chaos game optimization based clustering with trust based data transmission protocol for intelligent IoT edge systems

M Padmaa, T Jayasankar, S Venkatraman… - Journal of Parallel and …, 2022 - Elsevier
In the past decade, the Internet of Things (IoT) becomes essential in consumer and industrial
applications. The accessibility of high bandwidth Internet connection particularly with the …

An access control for IoT based on network community perception and social trust against Sybil attacks

GHC de Oliveira, A de Souza Batista… - … Journal of Network …, 2022 - Wiley Online Library
The evolution of the Internet of things (IoT) has increased the connection of personal
devices, mainly taking into account the habits and behavior of their owners. These …

Dissemination control in dynamic data clustering for dense IIoT against false data injection attack

C Pedroso, A Santos - International Journal of Network …, 2022 - Wiley Online Library
Summary The Internet of Things (IoT) has made possible the development of increasingly
driven services, like industrial Industrial Internet of Things (IIoT) services, that often deal with …

[HTML][HTML] The design of a defense mechanism to mitigate sinkhole attack in software defined wireless sensor cognitive radio networks

LC Sejaphala, M Velempini - Wireless Personal Communications, 2020 - Springer
The sink hole attack is a typical wireless sensor network attack. The sink hole node
advertises itself as the best route to the sink node or the base station. The nodes in the …

5G Network Security for IoT Implementation: A Systematic Literature Review

M Montaño-Blacio, J Briceño-Sarmiento… - … on Innovation and …, 2020 - Springer
Fifth generation (5G) wireless technologies satisfies the growing demand for the Internet of
Things (IoT), however, IoT devices are vulnerable to security threats due to the simplicity of …

[HTML][HTML] Machine learning-enabled hybrid intrusion detection system with host data transformation and an advanced two-stage classifier

Z Chen, M Simsek, B Kantarci, M Bagheri, P Djukic - Computer Networks, 2024 - Elsevier
Abstract Network Intrusion Detection Systems (NIDS) have been extensively investigated by
monitoring real network traffic and analyzing suspicious activities. However, there are …

A Scalable Cyber Security Framework for the Experimentation of DDoS Attacks of Things

DD Gemmer, BH Meyer, ER de Mello… - NOMS 2023-2023 …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) has amplified cyber security challenges for governments,
businesses, and individuals. IoT is a straightforward attack target once it comprises resource …

DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN

VR Rajasekar, S Rajkumar - Cluster Computing, 2024 - Springer
The RPL routing protocol is susceptible to Selective Forwarding Attack (SFA), wherein
malicious nodes selectively forward certain packets while discarding others and isolating a …