Routing attacks and mitigation methods for RPL-based Internet of Things
The recent bloom of Internet of Things (IoT) and its prevalence in many security-sensitive
environments made the security of these networks a crucial requirement. Routing in many of …
environments made the security of these networks a crucial requirement. Routing in many of …
RPL routing protocol over IoT: A comprehensive survey, recent advances, insights, bibliometric analysis, recommendations, and future directions
KA Darabkh, M Al-Akhras, JN Zomot… - Journal of Network and …, 2022 - Elsevier
In the course of time, the Internet of Things (IoT) has attracted significant research interest.
However, IoT devices have limited resources available in terms of battery power, processing …
However, IoT devices have limited resources available in terms of battery power, processing …
A comprehensive study of RPL and P2P-RPL routing protocols: Implementation, challenges and opportunities
In recent years, Internet of Things (IoT), which aims to achieve ubiquitous communication
among a large number of resource constraint embedded devices, has emerged as a new …
among a large number of resource constraint embedded devices, has emerged as a new …
Enhancing routing security in IoT: Performance evaluation of RPL's secure mode under attacks
As the routing protocol for low power and lossy networks (RPL) s became the standard for
routing in the Internet-of-Things (IoT) networks, many researchers had investigated the …
routing in the Internet-of-Things (IoT) networks, many researchers had investigated the …
RPL over internet of things: challenges, solutions, and recommendations
KA Darabkh, M Al-Akhras - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) has recently attracted significant research interest. Routing protocols
have a vital task in meeting the needs of IoT devices with the necessary ability to interwork …
have a vital task in meeting the needs of IoT devices with the necessary ability to interwork …
Secure routing in IoT: Evaluation of RPL's secure mode under attacks
As the Routing Protocol for Low Power and Lossy Networks (RPL) became the standard for
routing in the Internet of Things (IoT) networks, many researchers had investigated the …
routing in the Internet of Things (IoT) networks, many researchers had investigated the …
Improving routing protocol for low-power and lossy networks over IoT enviroment
KA Darabkh, M Al-Akhras - 2021 30th wireless and optical …, 2021 - ieeexplore.ieee.org
Prolonging the network lifetime and reducing the energy consumption are the major
dilemmas in Low Power and Lossy Networks (LLNs). Also, they are considered the crucial …
dilemmas in Low Power and Lossy Networks (LLNs). Also, they are considered the crucial …
Securing RPL using network coding: The chained secure mode (CSM)
Considered the preferred routing protocol for many Internet of Things (IoT) networks, the
routing protocol for low-power and lossy networks (RPL) incorporates three security modes …
routing protocol for low-power and lossy networks (RPL) incorporates three security modes …
The DAO induction attack: Analysis and countermeasure
AS Baghani, S Rahimpour… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
We study the destination advertisement object (DAO) induction attack, a new attack against
Internet Protocol version 6 (IPv6) routing protocol for low-power and lossy networks (RPL) …
Internet Protocol version 6 (IPv6) routing protocol for low-power and lossy networks (RPL) …
Performance evaluation of the RPL protocol in fixed and mobile sink low-power and lossy-networks
I Wadhaj, I Kristof, I Romdhani… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the
increase demand for mobility in mobile robotic and dynamic environment raises the question …
increase demand for mobility in mobile robotic and dynamic environment raises the question …