Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers

[1]  S. M. Muzammal,et al.  A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things , 2022, Sensors.

[2]  S. Brohi,et al.  Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning , 2022, Sensors.

[3]  G. Ragesh,et al.  Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications , 2022, The Journal of Supercomputing.

[4]  A. Ghaffari,et al.  MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications , 2022, Comput. Stand. Interfaces.

[5]  T. Bartzanas,et al.  Applications of IoT for optimized greenhouse environment and resources management , 2022, Comput. Electron. Agric..

[6]  Farzaneh Kaviani,et al.  CQARPL: Congestion and QoS-aware RPL for IoT applications under heavy traffic , 2022, The Journal of Supercomputing.

[7]  Mehrdad Sadeghi,et al.  A roadmap towards energy‐efficient data fusion methods in the Internet of Things , 2022, Concurr. Comput. Pract. Exp..

[8]  Mohsen Machhout,et al.  The Routing Protocol for low power and lossy networks (RPL) under Attack: Simulation and Analysis , 2022, 2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET).

[9]  Udai Pratap Rao,et al.  EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things , 2022, Peer-to-Peer Netw. Appl..

[10]  G. Geethakumari,et al.  A holistic framework for prediction of routing attacks in IoT-LLNs , 2021, The Journal of Supercomputing.

[11]  P. Nandhini,et al.  Version Attack Detection using Claim Algorithm in RPL based IoT Networks: Effects and Performance Parameters Evaluation , 2021, 2021 2nd International Conference on Smart Electronics and Communication (ICOSEC).

[12]  P. Nandhini,et al.  Classification of Intrusions in RPL-Based IoT Networks: A Comparison , 2021, Mobile Computing and Sustainable Informatics.

[13]  Somia Sahraoui,et al.  SAMP-RPL: secure and adaptive multipath RPL for enhanced security and reliability in heterogeneous IoT-connected low power and lossy networks , 2021, Journal of Ambient Intelligence and Humanized Computing.

[14]  S. Malliga,et al.  Energy efficient thwarting rank attack from RPL based IoT networks: A review , 2021 .

[15]  Shadi Aljawarneh,et al.  Routing protocol for low power and lossy network–load balancing time-based , 2021, International Journal of Machine Learning and Cybernetics.

[16]  Sipra Das Bit,et al.  LEADER: Low Overhead Rank Attack Detection for Securing RPL based IoT , 2020, 2021 International Conference on COMmunication Systems & NETworkS (COMSNETS).

[17]  Ali Seyfollahi,et al.  A Review of Intrusion Detection Systems in RPL Routing Protocol Based on Machine Learning for Internet of Things Applications , 2021, Wirel. Commun. Mob. Comput..

[18]  Jingsha He,et al.  Artificial Neural Network Model for Decreased Rank Attack Detection in RPL Based on IoT Networks , 2021 .

[19]  A. Kalita,et al.  Opportunistic Transmission of Control Packets for Faster Formation of 6TiSCH Network , 2021, ACM Trans. Internet Things.

[20]  Saurabh Sharma,et al.  Security explorations for routing attacks in low power networks on internet of things , 2020, The Journal of Supercomputing.

[21]  N. Z. Jhanjhi,et al.  Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP , 2020, Sensors.

[22]  Pascal Lorenz,et al.  Security Against Rank Attack in RPL Protocol , 2020, IEEE Network.

[23]  N. Z. Jhanjhi,et al.  Proposing a Secure RPL based Internet of Things Routing Protocol: A Review , 2020, Ad Hoc Networks.

[24]  Abdellatif Ezzouhairi,et al.  New Objective Function for RPL Protocol , 2020, Embedded Systems and Artificial Intelligence.

[25]  B. M. Mehtre,et al.  Directed Acyclic Graph Inherited Attacks and Mitigation Methods in RPL: A Review , 2019, Sustainable Communication Networks and Application.

[26]  Chung-Horng Lung,et al.  Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[27]  Abdur Rehman,et al.  Detection of rank attack in routing protocol for Low Power and Lossy Networks , 2018, Ann. des Télécommunications.

[28]  Bernard Tourancheau,et al.  Trickle-D: High Fairness and Low Transmission Load With Dynamic Redundancy , 2017, IEEE Internet of Things Journal.

[29]  Abderrezak Rachedi,et al.  A Secure Routing Protocol Based on RPL for Internet of Things , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[30]  Enzo Mingozzi,et al.  Trickle-F: Fair broadcast suppression to improve energy-efficient route formation with the RPL routing protocol , 2013, 2013 Sustainable Internet and ICT for Sustainability (SustainIT).