SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things
Abstract The Routing Protocol for Low-Power and Lossy Networks (RPL), the de facto
routing protocol for Internet of Things (IoT) offers little protection against various forms of …
routing protocol for Internet of Things (IoT) offers little protection against various forms of …
Dynamic and comprehensive trust model for IoT and its integration into RPL
SY Hashemi, F Shams Aliee - The Journal of Supercomputing, 2019 - Springer
Ensuring security in IoT routing protocols is more challenging due to the fact that devices are
mobile, resource constrained, and heterogeneous. The routing protocol for low-power and …
mobile, resource constrained, and heterogeneous. The routing protocol for low-power and …
A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches
SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and
exchange data. These “things” can be sensors, actuators, smartphones, wearables …
exchange data. These “things” can be sensors, actuators, smartphones, wearables …
THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack
The Internet of Things (IoT) and its relevant advances have attracted significant scholarly,
governmental, and industrial attention in recent years. Since the IoT specifications are quite …
governmental, and industrial attention in recent years. Since the IoT specifications are quite …
A trust-based model for secure routing against RPL attacks in internet of things
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is
vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …
vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …
Trust and mobility-based protocol for secure routing in Internet of Things
In the Internet of Things (IoT), the de facto Routing Protocol for Low Power and Lossy
Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and …
Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and …
CTrust‐RPL: A control layer‐based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks‐based Internet of Things …
Abstract Internet of Things (IoT) fostered a new epoch of innovation by interconnecting
digital devices to make human life more convenient and attractive. These smart objects are …
digital devices to make human life more convenient and attractive. These smart objects are …
Trust-aware and cooperative routing protocol for IoT security
The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power
and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification …
and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification …
Trust-based enhanced secure routing against rank and sybil attacks in IoT
A Tandon, P Srivastava - 2019 twelfth international conference …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging technology that plays a vital role in
interconnecting various objects into a network to provide desired services within its resource …
interconnecting various objects into a network to provide desired services within its resource …
A trust-based resilient routing mechanism for the internet of things
Local-area networks comprising the Internet of Things (IoT) consist mainly of devices that
have limited processing capabilities and face energy constraints. This has an implication on …
have limited processing capabilities and face energy constraints. This has an implication on …
相关搜索
- routing protocol lossy networks
- routing protocol low power
- routing protocol iot security
- routing protocol trust mechanism
- routing protocol control layer
- secure routing internet of things
- internet of things applications
- iot networks sybil attack
- rpl attacks internet of things
- low power lossy networks
- trust mechanism lossy networks
- trust mechanism low power
- things applications lossy networks
- things applications low power
- control layer lossy networks
- control layer low power