Proposing a Hybrid RPL Protocol for Rank and Wormhole Attack Mitigation using Machine Learning
暂无分享,去创建一个
Mamoona Humayun | Fatima-tuz-Zahra | NZ Jhanjhi | Sarfraz Nawaz Brohi | Nazir A. Malik | S. Brohi | M. Humayun | Noor Zaman Jhanjhi | Nazir A. Malik
[1] Mark Stamp,et al. Detecting malware evolution using support vector machines , 2020, Expert Syst. Appl..
[2] Rahil Hosseini,et al. A state-of-the-art survey of malware detection approaches using data mining techniques , 2018, Human-centric Computing and Information Sciences.
[3] Sayan Kumar Ray,et al. Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..
[4] Isabelle Chrisment,et al. A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks , 2017, IEEE Transactions on Network and Service Management.
[5] Tarik Taleb,et al. An Accurate Security Game for Low-Resource IoT Devices , 2017, IEEE Transactions on Vehicular Technology.
[6] Mohammed Anbar,et al. DDoS attack aware environment with secure clustering and routing based on RPL protocol operation , 2019, IET Circuits Devices Syst..
[7] Karel Heurtefeux,et al. Enhancing RPL Resilience Against Routing Layer Insider Attacks , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.
[8] Cong Pu,et al. Mitigating Forwarding misbehaviors in RPL-based low power and lossy networks , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[9] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[10] Mahadevan Supramaniam,et al. A Review of Intrusion Detection System using Machine Learning Approach , 2019 .
[11] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[12] Prakash Srivastava,et al. Trust-based Enhanced Secure Routing against Rank and Sybil Attacks in IoT , 2019, 2019 Twelfth International Conference on Contemporary Computing (IC3).
[13] Roberto Baldoni,et al. Survey on the Usage of Machine Learning Techniques for Malware Analysis , 2017, Comput. Secur..
[14] Noor Zaman,et al. A review on smart home present state and challenges: linked to context-awareness internet of things (IoT) , 2019, Wirel. Networks.
[15] Furkan Yusuf Yavuz,et al. Deep Learning for Detection of Routing Attacks in the Internet of Things , 2018, Int. J. Comput. Intell. Syst..
[16] Noor Zaman,et al. Proposing secure and lightweight authentication scheme for IoT based E-health applications , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).
[17] Hon Sun Chiu,et al. Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .
[18] Remi Badonnel,et al. Using the RPL protocol for supporting passive monitoring in the Internet of Things , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[19] Chung-Horng Lung,et al. Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.
[20] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[21] Noor Zaman,et al. A Lightweight and Secure Authentication Scheme for IoT Based E-Health Applications , 2019 .
[22] Michele Nogueira Lima,et al. Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[23] Seungjin Choi,et al. Supervised Learning , 2009, Encyclopedia of Biometrics.
[24] Imed Romdhani,et al. Addressing the DAO Insider Attack in RPL’s Internet of Things Networks , 2019, IEEE Communications Letters.
[25] Maysam Ghovanloo,et al. A dual-mode passive rectifier for wide-range input power flow , 2017, 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS).
[26] Mamoona Humayun,et al. SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET , 2019, 2019 International Conference on Computer and Information Sciences (ICCIS).
[27] Moirangthem Marjit Singh,et al. Wormhole Attack in Wireless Sensor Networks: A Critical Review , 2018, Advanced Computing and Communication Technologies.
[28] Sadiq Ur Rehman,et al. Sinkhole Attacks in Wireless Sensor Networks: A Survey , 2018, Wirel. Pers. Commun..
[29] Azzedine Boukerche,et al. A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-Power and Lossy Networks: A Focus on Core Operations , 2019, IEEE Communications Surveys & Tutorials.
[30] S. Sitharama Iyengar,et al. A Survey on Malware Detection Using Data Mining Techniques , 2017, ACM Comput. Surv..
[31] Remi Badonnel,et al. A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..