A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches

SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and
exchange data. These “things” can be sensors, actuators, smartphones, wearables …

[HTML][HTML] Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory

S Vijayalakshmi, S Bose, G Logeswari… - Cyber security and …, 2023 - Elsevier
Ad hoc networks are a new perspective of wireless communication for versatile hosts.
Security is a colossal worry for ad hoc networks, especially for those security-touchy …

A trust-based model for secure routing against RPL attacks in internet of things

SM Muzammal, RK Murugesan, NZ Jhanjhi… - Sensors, 2022 - mdpi.com
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is
vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …

Trust and mobility-based protocol for secure routing in Internet of Things

SM Muzammal, RK Murugesan, NZ Jhanjhi… - Sensors, 2022 - mdpi.com
In the Internet of Things (IoT), the de facto Routing Protocol for Low Power and Lossy
Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and …

Design of advanced intrusion detection systems based on hybrid machine learning techniques in hierarchically wireless sensor networks

GG Gebremariam, J Panda, S Indu - Connection Science, 2023 - Taylor & Francis
Wireless sensor networks (WSNs) are an emerging military and civilian technology that uses
sensors. Sensor networks are hierarchical and chaotic in remote, unmonitored sites …

E2‐SR: a novel energy‐efficient secure routing scheme to protect MANET‐IoT

M Ponguwala, S Rao - IET Communications, 2019 - Wiley Online Library
Integration of mobile ad hoc networks (MANETs) and internet of things (IoT) becomes an
emerging paradigm to enable opportunistic communication in IoT. However, the lack of …

Hybrid trust-based secure routing protocol for detection of routing attacks in environment monitoring over MANETs

G Arulselvan, A Rajaram - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
Maintaining a healthy environment requires constant vigilance. Keeping constant tabs on
environmental factors might be a useful tool in the fight against and recovery from …

Detection of packet dropping attack based on evidence fusion in IoT networks

W Ding, W Zhai, L Liu, Y Gu… - Security and …, 2022 - Wiley Online Library
Internet of Things (IoT) is widely used in environmental monitoring, smart healthcare, and
other fields. Due to its distributed nature, IoT is vulnerable to various internal attacks. One of …

DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN

VR Rajasekar, S Rajkumar - Cluster Computing, 2024 - Springer
The RPL routing protocol is susceptible to Selective Forwarding Attack (SFA), wherein
malicious nodes selectively forward certain packets while discarding others and isolating a …

Designing framework to secure data using K Means clustering based outlier Detection (KCOD) algorithm

S Nithinsha, S Anusuya - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
The objective of the research work is to propose an intrusion detection system in a cloud
environment using K-Means clustering-based outlier detection. In the open access and …