Routing attacks and mitigation methods for RPL-based Internet of Things
The recent bloom of Internet of Things (IoT) and its prevalence in many security-sensitive
environments made the security of these networks a crucial requirement. Routing in many of …
environments made the security of these networks a crucial requirement. Routing in many of …
Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes
Advancement in technology with the proliferation of new wireless communication protocols
gave rise to the new era of ubiquitous computing, called Internet of Things (IoT). IoT …
gave rise to the new era of ubiquitous computing, called Internet of Things (IoT). IoT …
SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things
Abstract The Routing Protocol for Low-Power and Lossy Networks (RPL), the de facto
routing protocol for Internet of Things (IoT) offers little protection against various forms of …
routing protocol for Internet of Things (IoT) offers little protection against various forms of …
Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review
Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large
number of applications for the benefit of mankind. Advancements in embedded system …
number of applications for the benefit of mankind. Advancements in embedded system …
Proposing a secure RPL based internet of things routing protocol: a review
Abstract Nowadays, the Internet of Things (IoT) research domain attracts the researchers,
due to its extensive collection of applications and ease in deploying in several domains of …
due to its extensive collection of applications and ease in deploying in several domains of …
Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP
The rapid growth of the Internet of Things (IoT) and the massive propagation of wireless
technologies has revealed recent opportunities for development in various domains of real …
technologies has revealed recent opportunities for development in various domains of real …
Assessment of routing attacks and mitigation techniques with RPL control messages: A survey
Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard routing protocol for
the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless …
the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless …
Dynamic and comprehensive trust model for IoT and its integration into RPL
SY Hashemi, F Shams Aliee - The Journal of Supercomputing, 2019 - Springer
Ensuring security in IoT routing protocols is more challenging due to the fact that devices are
mobile, resource constrained, and heterogeneous. The routing protocol for low-power and …
mobile, resource constrained, and heterogeneous. The routing protocol for low-power and …
Security against rank attack in RPL protocol
The Routing Protocol for Low Power and Lossy Networks (RPL) is experiencing a wave of
security threats, due to the need of its utility in the Internet of Things (IoT). RPL is so far …
security threats, due to the need of its utility in the Internet of Things (IoT). RPL is so far …
CTrust‐RPL: A control layer‐based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks‐based Internet of Things …
Abstract Internet of Things (IoT) fostered a new epoch of innovation by interconnecting
digital devices to make human life more convenient and attractive. These smart objects are …
digital devices to make human life more convenient and attractive. These smart objects are …