RPL-based attack detection approaches in IoT networks: review and taxonomy

N Alfriehat, M Anbar, M Aladaileh, I Hasbullah… - Artificial Intelligence …, 2024 - Springer
Abstract The Routing Protocol for Low-Power and Lossy Networks (RPL) plays a crucial role
in the Internet of Things (IoT) and Wireless Sensor Networks. However, ensuring the RPL …

Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy

N Alfriehat, M Anbar, S Karuppayah, SDA Rihan… - IEEE …, 2024 - ieeexplore.ieee.org
The internet of things (IoT) is an emerging technological advancement with significant
implications. It connects a wireless sensor or node network via low-power and lossy …

A lightweight mitigation approach against a new inundation attack in RPL-based IoT networks

M Rouissat, M Belkheir, IS Alsukayti, A Mokaddem - Applied Sciences, 2023 - mdpi.com
Internet of Things (IoT) networks are being widely deployed for a broad range of critical
applications. Without effective security support, such a trend would open the doors to …

RPL-based IoT networks under simple and complex routing security attacks: An experimental study

IS Alsukayti, M Alreshoodi - Applied Sciences, 2023 - mdpi.com
Effective security support still remains a challenge even for a standardized Internet of Things
network protocol such as the IPv6 Routing Protocol for Low-Power and Lossy Networks …

Cloud computing in healthcare-investigation of threats, vulnerabilities, future challenges and counter measure

S Asif, M Ambreen, Z Muhammad… - LC International Journal …, 2022 - lcjstem.com
The use of cloud computing has gradually increased over the last decade. Healthcare
provision has become more scalable, efficient, and effective through the cloud-based …

Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion

HSA Belkhira, M Belkheir, M Rouissat… - Open Information …, 2024 - degruyter.com
The security landscape of Internet of Things (IoT) networks continues to draw significant
attention from recent networks; the Version Number Attack (VNA) stands out as a prominent …

A Lightweight Mitigation Technique Against a Modified Version Number Attack in IoT Networks

IS Alsukayti, M Alreshoodi, M Rouissat - IEEE Access, 2025 - ieeexplore.ieee.org
The potential worldwide deployment of Internet of Things (IoT) networks for a broad scope of
critical applications has led to significant security concerns. With no effective support for IoT …

A Simple Approach for Mitigating a New Flooding Attack in RPL-Based IoT Networks

M Rouissat, IS Alsukayti, M Belkheir… - IEEE …, 2025 - ieeexplore.ieee.org
The growing deployment of Internet of Things (IoT) devices in diverse daily-life smart
applications makes the security of IoT networks a critical requirement. However, efficient …

Ensemble-Guard IoT: A Lightweight Ensemble Model for Real-Time Attack Detection on Imbalanced Dataset

MU Tanveer, K Munir, M Amjad, SAJ Zaidi… - IEEE …, 2024 - ieeexplore.ieee.org
The rapid increase in the number of IoT devices has made ensuring robust real-time attack
detection more critical than ever. The volume of data being accessed in real-time by these …

Cybersecurity for Battlefield of Things—A Comprehensive Review

A Singh, G Sharma, R Krishnamurthi… - Journal of Circuits …, 2022 - World Scientific
Battlefield of Things (BoT) is a modern defense network that connects smart military devices
to strategic networks. Cybersecurity plays a vital role in maintaining the security of BoT …