A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches

SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and
exchange data. These “things” can be sensors, actuators, smartphones, wearables …

A survey on trust models in heterogeneous networks

J Wang, Z Yan, H Wang, T Li… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Heterogeneous networks (HetNets) merge different types of networks into an integrated
network system, which has become a hot research area in recent years towards next …

Deep learning in security of internet of things

Y Li, Y Zuo, H Song, Z Lv - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Internet-of-Things (IoT) technology is increasingly prominent in the current stage of social
development. All walks of life have begun to implement the IoT integration technology, so as …

[PDF][PDF] Robust cluster-based routing protocol for IoT-assisted smart devices in WSN.

M Shafiq, H Ashraf, A Ullah, M Masud… - … Materials & Continua, 2021 - cdn.techscience.cn
The Internet of Things (IoT) is gaining attention because of its broad applicability, especially
by integrating smart devices for massive communication during sensing tasks. IoT-assisted …

Dynamic bargain game theory in the internet of things for data trustworthiness

AC Sumathi, M Akila, R Pérez de Prado, M Wozniak… - Sensors, 2021 - mdpi.com
Smart home and smart building systems based on the Internet of Things (IoT) in smart cities
currently suffer from security issues. In particular, data trustworthiness and efficiency are two …

A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things

TA Al-Amiedy, M Anbar, B Belaton, AA Bahashwan… - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is one of the most rapidly evolving networking concepts,
offering various applications for human benefit. Advances in embedded system architecture …

A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest–RFTRUST

K Prathapchandran, T Janani - Computer Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) plays a vital role in many application domains like
battlefield surveillance, wildlife monitoring, disaster response, medical care, transportation …

Rank and wormhole attack detection model for RPL-based internet of things using machine learning

F Zahra, NZ Jhanjhi, SN Brohi, NA Khan, M Masud… - Sensors, 2022 - mdpi.com
The proliferation of the internet of things (IoT) technology has led to numerous challenges in
various life domains, such as healthcare, smart systems, and mission-critical applications …

Trust and mobility-based protocol for secure routing in Internet of Things

SM Muzammal, RK Murugesan, NZ Jhanjhi… - Sensors, 2022 - mdpi.com
In the Internet of Things (IoT), the de facto Routing Protocol for Low Power and Lossy
Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and …

Multicast DIS attack mitigation in RPL-based IoT-LLNs

F Medjek, D Tandjaoui, N Djedjig… - Journal of Information …, 2021 - Elsevier
Abstract The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was
standardised by the IETF ROLL Working Group to address the routing issues in the Internet …