Routing attacks and mitigation methods for RPL-based Internet of Things
The recent bloom of Internet of Things (IoT) and its prevalence in many security-sensitive
environments made the security of these networks a crucial requirement. Routing in many of …
environments made the security of these networks a crucial requirement. Routing in many of …
A comprehensive survey on enhancements and limitations of the RPL protocol: A focus on the objective function
The RPL routing protocol for low power and lossy networks uses the objective function (OF)
to build a Destination Oriented Directed Acyclic Graph (DODAG) based on a set of metrics …
to build a Destination Oriented Directed Acyclic Graph (DODAG) based on a set of metrics …
Cyber attacks on smart farming infrastructure
S Sontowski, M Gupta, SSL Chukkapalli… - 2020 IEEE 6th …, 2020 - ieeexplore.ieee.org
Smart farming also known as precision agriculture is gaining more traction for its promising
potential to fulfill increasing global food demand and supply. In a smart farm, technologies …
potential to fulfill increasing global food demand and supply. In a smart farm, technologies …
A survey of IoT protocols and their security issues through the lens of a generic IoT stack
J Tournier, F Lesueur, F Le Mouël, L Guyon… - Internet of Things, 2021 - Elsevier
Abstract The Internet of things (IoT) is rapidly growing, and many security issues relate to its
wireless technology. These security issues are challenging because IoT protocols are …
wireless technology. These security issues are challenging because IoT protocols are …
Intrusion detection systems in RPL-based 6LoWPAN: A systematic literature review
Drastic reduction in the manufacturing cost of sensors and actuators has resulted in
considerable growth in the number of smart objects. The so-called Internet of Things (IoT) …
considerable growth in the number of smart objects. The so-called Internet of Things (IoT) …
A real-time intrusion detection system for wormhole attack in the RPL based Internet of Things
S Deshmukh-Bhosale, SS Sonavane - Procedia Manufacturing, 2019 - Elsevier
Today there is a trend of the Internet of Things (IoT) where many objects are connected to
the internet. In future number of objects connected to the internet will be more as compared …
the internet. In future number of objects connected to the internet will be more as compared …
LiDL: Localization with early detection of sybil and wormhole attacks in IoT networks
Abstract The Internet of Things (IoT) is recognized as a disruptive innovation that has been
led by industry leaders and researchers. IoT promises to improve our daily life based on …
led by industry leaders and researchers. IoT promises to improve our daily life based on …
A review of intrusion detection systems in RPL routing protocol based on machine learning for internet of things applications
A Seyfollahi, A Ghaffari - Wireless Communications and Mobile …, 2021 - Wiley Online Library
IPv6 routing protocol for low‐power and lossy networks (RPL) has been developed as a
routing agent in low‐power and lossy networks (LLN), where nodes' resource constraint …
routing agent in low‐power and lossy networks (LLN), where nodes' resource constraint …
AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things
Abstract The Internet of things (IoT) is emerging as a prime area of research in the modern
era. The significance of IoT in the daily life is increasing due to the increase in objects or …
era. The significance of IoT in the daily life is increasing due to the increase in objects or …
Security explorations for routing attacks in low power networks on internet of things
The routing protocol for low power and lossy networks works as an effective method for
communication in Contiki. However, many security attacks exist in RPL. These attacks affect …
communication in Contiki. However, many security attacks exist in RPL. These attacks affect …