A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things

TA Al-Amiedy, M Anbar, B Belaton, AHH Kabla… - Sensors, 2022 - mdpi.com
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6
Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in …

Deep learning-based reliable routing attack detection mechanism for industrial Internet of Things

S Nayak, N Ahmed, S Misra - Ad Hoc Networks, 2021 - Elsevier
An enormous amount of data processing occurs at the cloud and edge to carry out different
kinds of analytics in Industrial Internet of Things (IIoT). To deal with the analytics using such …

RPL attack detection and prevention in the Internet of Things networks using a GRU based deep learning

S Cakir, S Toklu, N Yalcin - IEEE Access, 2020 - ieeexplore.ieee.org
Cyberattacks targeting Internet of Things (IoT), have increased significantly, over the past
decade, with the spread of internet-connected smart devices and applications. Routing …

Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy

N Alfriehat, M Anbar, S Karuppayah, SDA Rihan… - IEEE …, 2024 - ieeexplore.ieee.org
The internet of things (IoT) is an emerging technological advancement with significant
implications. It connects a wireless sensor or node network via low-power and lossy …

A cross-layer intrusion detection system for RPL-based Internet of Things

E Canbalaban, S Sen - Ad-Hoc, Mobile, and Wireless Networks: 19th …, 2020 - Springer
Abstract The Internet of Things (IoT) is a heterogeneous network of constrained devices
connected both to each other and to the Internet. Since the significance of IoT has risen …

IoT-Sentry: A cross-layer-based intrusion detection system in standardized Internet of Things

M Malik, M Dutta, J Granjal - IEEE Sensors Journal, 2021 - ieeexplore.ieee.org
With the widespread expansion of internet connected devices, securing the Internet of
Things (IoT) has become one of the biggest challenges and a crucial issue for ensuring a …

A mechanism to detecting flooding attacks in quantum enabled cloud-based lowpower and lossy networks

S Ankam, NS Reddy - Theoretical Computer Science, 2023 - Elsevier
RPL (Routing Protocol) is the Quantum enabled Cloud-based Low-Power Wireless Personal
Area Networks (6LoWPAN) routing protocol. Destination Oriented Directed Acyclic Graph …

Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach

H Albinali, F Azzedin - IEEE Transactions on Network and …, 2024 - ieeexplore.ieee.org
The RPL protocol was initially created to connect multiple IP-based communication
applications in low-power and lossy network environments. However, it has become a target …

A review of isolation attack mitigation mechanismsin RPL-Based 6LoWPAN of internet of things

VR Rajasekar, S Rajkumar - Computer Assisted Methods in …, 2024 - yadda.icm.edu.pl
The Routing Protocol for Low-Power and Lossy Networks (RPL) is an open standard routing
protocol defined by the Internet Engineering Task Force (IETF) to address the constraints of …

Comparison of ml algorithms to detect vulnerabilities of rpl-based iot devices in intelligent and fuzzy systems

MU Kiraz, A Yilmaz - International Conference on Intelligent and Fuzzy …, 2021 - Springer
Abstract The RPL protocol (Routing Protocol for Low-Power and Lossy Networks) was
designed by IETF [1] for 6LoWPAN to optimize power consumption on the Internet of Things …