Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …
A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things
Abstract The Internet of Things (IoT) is one of the most rapidly evolving networking concepts,
offering various applications for human benefit. Advances in embedded system architecture …
offering various applications for human benefit. Advances in embedded system architecture …
CNN-CNN: dual convolutional neural network approach for feature selection and attack detection on internet of things networks
The Internet of Things (IoT) has brought significant advancements that have connected our
world more closely than ever before. However, the growing number of connected devices …
world more closely than ever before. However, the growing number of connected devices …
DDoS attack and detection methods in internet-enabled networks: Concept, research perspectives, and challenges
In recent times, distributed denial of service (DDoS) has been one of the most prevalent
security threats in internet-enabled networks, with many internet of things (IoT) devices …
security threats in internet-enabled networks, with many internet of things (IoT) devices …
Rank and wormhole attack detection model for RPL-based internet of things using machine learning
The proliferation of the internet of things (IoT) technology has led to numerous challenges in
various life domains, such as healthcare, smart systems, and mission-critical applications …
various life domains, such as healthcare, smart systems, and mission-critical applications …
RPL-based attack detection approaches in IoT networks: review and taxonomy
Abstract The Routing Protocol for Low-Power and Lossy Networks (RPL) plays a crucial role
in the Internet of Things (IoT) and Wireless Sensor Networks. However, ensuring the RPL …
in the Internet of Things (IoT) and Wireless Sensor Networks. However, ensuring the RPL …
A systematic literature review on machine learning and deep learning approaches for detecting DDoS attacks in software-defined networking
Software-defined networking (SDN) is a revolutionary innovation in network technology with
many desirable features, including flexibility and manageability. Despite those advantages …
many desirable features, including flexibility and manageability. Despite those advantages …
An intelligent early flood forecasting and prediction leveraging machine and deep learning algorithms with advanced alert system
Flood disasters are a natural occurrence around the world, resulting in numerous casualties.
It is vital to develop an accurate flood forecasting and prediction model in order to curb …
It is vital to develop an accurate flood forecasting and prediction model in order to curb …
Key agreement and authentication protocols in the Internet of Things: A survey
S Szymoniak, S Kesar - Applied Sciences, 2022 - mdpi.com
The rapid development of Internet of things (IoT) technology has made the IoT applicable in
many areas of life and has contributed to the IoT's improvement. IoT devices are equipped …
many areas of life and has contributed to the IoT's improvement. IoT devices are equipped …
Conditional tabular generative adversarial based intrusion detection system for detecting ddos and dos attacks on the internet of things networks
The increasing use of Internet of Things (IoT) devices has led to a rise in Distributed Denial
of Service (DDoS) and Denial of Service (DoS) attacks on these networks. These attacks can …
of Service (DDoS) and Denial of Service (DoS) attacks on these networks. These attacks can …