Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review

A Verma, V Ranga - IEEE Sensors Journal, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large
number of applications for the benefit of mankind. Advancements in embedded system …

A survey: Attacks on RPL and 6LoWPAN in IoT

P Pongle, G Chavan - 2015 International conference on …, 2015 - ieeexplore.ieee.org
6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard allows heavily
constrained devices to connect to IPv6 networks. 6LoWPAN is novel IPv6 header …

A mutual authentication and key establishment scheme for M2M communication in 6LoWPAN networks

Y Qiu, M Ma - IEEE transactions on industrial informatics, 2016 - ieeexplore.ieee.org
The machine-to-machine (M2M) communication, which plays a vital role in the Internet of
Things (IoT), allows wireless and wired systems to monitor environments and exchange the …

A survey: Intrusion detection techniques for internet of things

S Choudhary, N Kesswani - International Journal of Information …, 2019 - igi-global.com
The latest buzzword in internet technology nowadays is the Internet of Things. The Internet
of Things (IoT) is an ever-growing network which will transform real-world objects into smart …

Extracting commercialization opportunities of the Internet of Things: Measuring text similarity between papers and patents

Y Takano, Y Kajikawa - Technological Forecasting and Social Change, 2019 - Elsevier
In the field of technology management, methods have been developed to detect
technologies that are important in industry by analyzing massive numbers of documents …

Modeling and analyses of IP spoofing attack in 6LoWPAN network

M Mavani, K Asawa - Computers & Security, 2017 - Elsevier
Abstract 6LoWPAN (modified version of IPv6 for low power devices) inherits security threats
from its predecessor protocols, IPv4 and IPv6. IP spoofing is one such classic attack. There …

Security issues in IPv6 over Low-power wireless personal area networks (6LoWPAN): a review

SO Ooko, J Kadam'manja, MG Uwizeye… - … Arab Conference on …, 2020 - ieeexplore.ieee.org
The use of Internet of Things (IoT) is fast growing and more objects need a connection to the
internet to extend their capabilities. 6LoWPAN introduces the IPv6 usage to connect IEEE …

Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addresses

M Mavani, K Asawa - Peer-to-Peer Networking and Applications, 2020 - Springer
An attacker can disrupt the network operations in the 6LoWPANs by spoofing the IPv6
address while evading the detection. Despite many existing spoofing prevention techniques …

[PDF][PDF] Iot operating systems and security challenges

M Asim, W Iqbal - International Journal of Computer Science and …, 2016 - academia.edu
The emerging trend of pervasive computing aims embedded devices such as smart phones,
autofocus cameras, musical instruments, home video systems etc with microprocessor and …

[PDF][PDF] SECURITY ANALYSIS OF INTERNET OF THINGS ADAPTATION LAYER.

SM Sajjad, M Yousaf - Science International, 2016 - researchgate.net
Internet of Things (IoT) is a model in which everyday elements possess built-in
computational capabilities and are proficient of generating and distributing information …