Internet of Things intrusion detection systems: a comprehensive review and future directions

A Heidari, MA Jabraeil Jamali - Cluster Computing, 2023 - Springer
Abstract The Internet of Things (IoT) is a paradigm that connects objects to the Internet as a
whole and enables them to work together to achieve common objectives, such as innovative …

A review of intrusion detection systems in RPL routing protocol based on machine learning for internet of things applications

A Seyfollahi, A Ghaffari - Wireless Communications and Mobile …, 2021 - Wiley Online Library
IPv6 routing protocol for low‐power and lossy networks (RPL) has been developed as a
routing agent in low‐power and lossy networks (LLN), where nodes' resource constraint …

Passive rule-based approach to detect sinkhole attack in RPL-based internet of things networks

S Al-Sarawi, M Anbar, BA Alabsi, MA Aladaileh… - IEEE …, 2023 - ieeexplore.ieee.org
An Internet of Things (IoT) refers to a network of smart devices that enable data collection
and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless …

Mitigating denial of service attacks in RPL-based IoT environments: trust-based approach

F Azzedin - IEEE Access, 2023 - ieeexplore.ieee.org
In domains such as telehealth, intelligent transportation, and autonomous agriculture,
ensuring secure routing of collected and exchanged data is paramount. Since its inception …

Threat analysis model to control IoT network routing attacks through deep learning approach

K Janani, S Ramamoorthy - Connection Science, 2022 - Taylor & Francis
Most of the recent research has focused on the Internet of Things (IoT) and its applications.
The open interface and network connectivity of the interconnected systems under the IoT …

A reputation‐based RPL protocol to detect selective forwarding attack in Internet of Things

A Patel, D **wala - International Journal of Communication …, 2022 - Wiley Online Library
Summary Internet of Things (IoT) is an internet of smart objects where smart objects
communicate with each other. IoT objects are deployed in open medium with dynamic …

A softwarized intrusion detection system for the RPL-based Internet of Things networks

G Violettas, G Simoglou, S Petridou… - Future Generation …, 2021 - Elsevier
Abstract Internet of Things (IoT) constitutes a pivotal contributor to the Industry 4.0 (I 4.0)
vision, technologically transforming production and societies. It enables novel services …

Mitigating the worst parent attack in RPL based internet of things

R Sahay, G Geethakumari, B Mitra - Cluster Computing, 2022 - Springer
Abstract The Low Power and Lossy Networks (LLNs) in the Internet of Things environment
comprising constrained embedded devices have particular routing requirements that are …

Centralized and distributed intrusion detection for resource-constrained wireless SDN networks

GAN Segura, A Chorti, CB Margi - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Software-defined networking (SDN) was devised to simplify network management and
automate infrastructure sharing in wired networks. These benefits motivated the application …