Internet of things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications

N Abosata, S Al-Rubaye, G Inalhan, C Emmanouilidis - Sensors, 2021 - mdpi.com
The growth of the Internet of Things (IoT) offers numerous opportunities for developing
industrial applications such as smart grids, smart cities, smart manufacturers, etc. By utilising …

Assessment of routing attacks and mitigation techniques with RPL control messages: A survey

AO Bang, UP Rao, P Kaliyar, M Conti - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard routing protocol for
the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless …

Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication

K Mabodi, M Yusefi, S Zandiyan, L Irankhah… - The journal of …, 2020 - Springer
The internet of things (IoT) is able to provide a prediction of linked, universal, and smart
nodes that have autonomous interaction when they present services. Because of wide …

Intrusion detection systems in RPL-based 6LoWPAN: A systematic literature review

AM Pasikhani, JA Clark, P Gope… - IEEE Sensors …, 2021 - ieeexplore.ieee.org
Drastic reduction in the manufacturing cost of sensors and actuators has resulted in
considerable growth in the number of smart objects. The so-called Internet of Things (IoT) …

A trust-based intrusion detection system for RPL networks: Detecting a combination of rank and blackhole attacks

PP Ioulianou, VG Vassilakis… - Journal of Cybersecurity …, 2022 - mdpi.com
Routing attacks are a major security issue for Internet of Things (IoT) networks utilising
routing protocols, as malicious actors can overwhelm resource-constrained devices with …

Security aspects for RPL-based protocols: A systematic review in IoT

K Avila, D Jabba, J Gomez - Applied Sciences, 2020 - mdpi.com
The Internet of things (IoT) is a concept that has gained traction over the last decade. IoT
networks have evolved around the wireless sensor network (WSN), and the following …

NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things

B Seyedi, R Fotohi - The Journal of Supercomputing, 2020 - Springer
Abstract Internet of Things (IoTs) is a new concept in computer science that connects the
objects with limited resources to unreliable internet through different technologies. The …

A trust-based security model to detect misbehaving nodes in Internet of Things (IoT) environment using logistic regression

K Prathapchandran, T Janani - Journal of physics: conference …, 2021 - iopscience.iop.org
Ensuring authentication in the Internet of Things (IoT) environment is a crucial task because
of its unique characteristics which include sensing, intelligence, large scale, selfconfiguring …

Assessment and analysis of action degeneracy due to blackhole attacks in wireless sensor networks

T Saravanan, P Sasikumar - … of 6th international conference on recent …, 2021 - Springer
Wireless sensor systems (WSN) have turned into a developing zone of innovative work
because of the huge number of uses that can significantly profit by such frameworks and has …

Decentralized prediction and reputation approach in vehicular networks

M Najafi, L Khoukhi, M Lemercier - Transactions on Emerging …, 2022 - Wiley Online Library
A vehicle ad‐hoc network (VANET) is an essential component of the intelligent
transportation system. In VANET, vehicle‐to‐vehicle communication plays a significant role …