SMTrust: Proposing Trust-Based Secure Routing Protocol for RPL Attacks for IoT Applications
暂无分享,去创建一个
Low Tang Jung | Raja Kumar Murugesan | Syeda Mariam Muzammal | Noor Zaman Jhanjhi | S. M. Muzammal | N. Jhanjhi | L. T. Jung | R. Murugesan
[1] Fereidoon Shams Aliee,et al. Dynamic and comprehensive trust model for IoT and its integration into RPL , 2018, The Journal of Supercomputing.
[2] Noor Zaman,et al. Proposing secure and lightweight authentication scheme for IoT based E-health applications , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).
[3] Furkan Yusuf Yavuz,et al. Deep Learning for Detection of Routing Attacks in the Internet of Things , 2018, Int. J. Comput. Intell. Syst..
[4] A. Sunitha Nandhini,et al. A Novel Security and Energy Efficient Data Aggregation for Medical Internet of Things Using Trust , 2020 .
[5] Farookh Khadeer Hussain,et al. A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT) , 2018, Computing.
[6] Ahmad Akbari,et al. A trust management scheme for IoT-enabled environmental health/accessibility monitoring services , 2018, International Journal of Information Security.
[7] Stephen E. Deering,et al. Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.
[8] Geethapriya Thamilarasu,et al. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things , 2019, Sensors.
[9] Jiannong Cao,et al. CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things , 2019, IEEE Internet of Things Journal.
[10] Syeda Mariam Muzammal,et al. A Study on Secured Authentication and Authorization in Internet of Things: Potential of Blockchain Technology , 2019 .
[11] A Meena Kowshalya,et al. Dynamic trust management for secure communications in social internet of things (SIoT) , 2018, Sādhanā.
[12] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[13] Sayan Kumar Ray,et al. A Trust-based Defence Scheme for Mitigating Blackhole and Selective Forwarding Attacks in the RPL Routing Protocol , 2018 .
[14] Thomas Lagkas,et al. Network Protocols, Schemes, and Mechanisms for Internet of Things (IoT): Features, Open Challenges, and Trends , 2018, Wirel. Commun. Mob. Comput..
[15] Angel Lozano,et al. A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs) , 2015, RFC.
[16] Raja Kumar Murugesan,et al. A Study on Leveraging Blockchain Technology for IoT Security Enhancement , 2018, 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA).
[17] M. Humayun,et al. Smart Secure and Energy Efficient Scheme for E-Health Applications using IoT: A Review , 2020 .
[18] Preetha Thulasiraman,et al. A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[19] Sayan Kumar Ray,et al. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..
[20] Mohsen Guizani,et al. Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things , 2018, 2018 IEEE 43rd Conference on Local Computer Networks (LCN).
[21] Abdur Rehman,et al. Detection of rank attack in routing protocol for Low Power and Lossy Networks , 2018, Ann. des Télécommunications.
[22] Mangal Sain,et al. Survey on security in Internet of Things: State of the art and challenges , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[23] A. Shanmugam,et al. Jensen–Shannon Divergence Based Independent Component Analysis to Detect and Prevent Black Hole Attacks in Healthcare WSN , 2019, Wireless Personal Communications.
[24] Nitin Khanna,et al. Study of trust‐based mechanism and its component model in MANET: Current research state, issues, and future recommendation , 2019, Int. J. Commun. Syst..
[25] Victor C. M. Leung,et al. Trust management for secure cognitive radio vehicular ad hoc networks , 2019, Ad Hoc Networks.
[26] Mohammad Nauman,et al. Trust in IoT: dynamic remote attestation through efficient behavior capture , 2017, Cluster Computing.
[27] N. Z. Jhanjhi,et al. Proposing a Secure RPL based Internet of Things Routing Protocol: A Review , 2020, Ad Hoc Networks.
[28] Pete Burnap,et al. A Supervised Intrusion Detection System for Smart Home IoT Devices , 2019, IEEE Internet of Things Journal.
[29] Mansour Sheikhan,et al. Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..
[30] Donn B. Parker,et al. Restating the Foundation of Information Security , 1991, SEC.
[31] Zhihua Zhang,et al. Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks , 2017, IEEE Access.
[32] Chung-Horng Lung,et al. Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.
[33] Noor Zaman,et al. Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication , 2020, IEEE Access.
[34] Gianluca Dini,et al. An Implementation and Evaluation of the Security Features of RPL , 2017, ADHOC-NOW.
[35] Shaveta Rani,et al. Towards a Light Weight Routing Security in IoT Using Non-cooperative Game Models and Dempster–Shaffer Theory , 2020, Wirel. Pers. Commun..