Routing attacks and mitigation methods for RPL-based Internet of Things

A Raoof, A Matrawy, CH Lung - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
The recent bloom of Internet of Things (IoT) and its prevalence in many security-sensitive
environments made the security of these networks a crucial requirement. Routing in many of …

A comprehensive survey on enhancements and limitations of the RPL protocol: A focus on the objective function

H Lamaazi, N Benamar - Ad Hoc Networks, 2020 - Elsevier
The RPL routing protocol for low power and lossy networks uses the objective function (OF)
to build a Destination Oriented Directed Acyclic Graph (DODAG) based on a set of metrics …

Cyber attacks on smart farming infrastructure

S Sontowski, M Gupta, SSL Chukkapalli… - 2020 IEEE 6th …, 2020 - ieeexplore.ieee.org
Smart farming also known as precision agriculture is gaining more traction for its promising
potential to fulfill increasing global food demand and supply. In a smart farm, technologies …

A survey of IoT protocols and their security issues through the lens of a generic IoT stack

J Tournier, F Lesueur, F Le Mouël, L Guyon… - Internet of Things, 2021 - Elsevier
Abstract The Internet of things (IoT) is rapidly growing, and many security issues relate to its
wireless technology. These security issues are challenging because IoT protocols are …

Intrusion detection systems in RPL-based 6LoWPAN: A systematic literature review

AM Pasikhani, JA Clark, P Gope… - IEEE Sensors …, 2021 - ieeexplore.ieee.org
Drastic reduction in the manufacturing cost of sensors and actuators has resulted in
considerable growth in the number of smart objects. The so-called Internet of Things (IoT) …

A real-time intrusion detection system for wormhole attack in the RPL based Internet of Things

S Deshmukh-Bhosale, SS Sonavane - Procedia Manufacturing, 2019 - Elsevier
Today there is a trend of the Internet of Things (IoT) where many objects are connected to
the internet. In future number of objects connected to the internet will be more as compared …

LiDL: Localization with early detection of sybil and wormhole attacks in IoT networks

P Kaliyar, WB Jaballah, M Conti, C Lal - Computers & Security, 2020 - Elsevier
Abstract The Internet of Things (IoT) is recognized as a disruptive innovation that has been
led by industry leaders and researchers. IoT promises to improve our daily life based on …

A review of intrusion detection systems in RPL routing protocol based on machine learning for internet of things applications

A Seyfollahi, A Ghaffari - Wireless Communications and Mobile …, 2021 - Wiley Online Library
IPv6 routing protocol for low‐power and lossy networks (RPL) has been developed as a
routing agent in low‐power and lossy networks (LLN), where nodes' resource constraint …

AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things

S Sharma, VK Verma - The Journal of Supercomputing, 2021 - Springer
Abstract The Internet of things (IoT) is emerging as a prime area of research in the modern
era. The significance of IoT in the daily life is increasing due to the increase in objects or …

Security explorations for routing attacks in low power networks on internet of things

S Sharma, VK Verma - The Journal of Supercomputing, 2021 - Springer
The routing protocol for low power and lossy networks works as an effective method for
communication in Contiki. However, many security attacks exist in RPL. These attacks affect …