A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things
Abstract The Internet of Things (IoT) is one of the most rapidly evolving networking concepts,
offering various applications for human benefit. Advances in embedded system architecture …
offering various applications for human benefit. Advances in embedded system architecture …
Secure and scalable healthcare data transmission in IoT based on optimized routing protocols for mobile computing applications
The Internet of Things (IoT) has impacted various aspects of life, but its profound effects on
the health sector are particularly striking because of its cutting‐edge nature. Mobile …
the health sector are particularly striking because of its cutting‐edge nature. Mobile …
Data Quality in Human-Centric Sensing Based Next Generation IoT Systems: A Comprehensive Survey of Models, Issues and Challenges
Human-Centric Sensing (HCS), a novel approach in the evolution of the Next Generation
Internet of Things (NG-IoT), exploits the ubiquity of diverse smart devices, including …
Internet of Things (NG-IoT), exploits the ubiquity of diverse smart devices, including …
Compatible Authentication and Key Agreement Protocol for Low Power and Lossy Network in Iot Environment.
Abstract Today, the Internet of Things can be described as the fastest-growing network that
offers applications in a wide range of applications. This breadth has led to a wide range of …
offers applications in a wide range of applications. This breadth has led to a wide range of …
A trust-based model for secure routing against RPL attacks in internet of things
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is
vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …
vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …
Trust and mobility-based protocol for secure routing in Internet of Things
In the Internet of Things (IoT), the de facto Routing Protocol for Low Power and Lossy
Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and …
Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and …
Utilize DBN and DBSCAN to detect selective forwarding attacks in event-driven wireless sensors networks
Q Li, Y Ma, Y Wu - Engineering Applications of Artificial Intelligence, 2023 - Elsevier
Malicious nodes launching selective forwarding attacks jeopardize network reliability in
event-driven wireless sensor networks. Swift detection and exclusion of these nodes are …
event-driven wireless sensor networks. Swift detection and exclusion of these nodes are …
Identify selective forwarding attacks using danger model: Promote the detection accuracy in wireless sensor networks
X Huang, Y Wu - IEEE Sensors Journal, 2022 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are prone to attack due to open work conditions and
broadcast communication. The selective forwarding attack, one of the inner attacks in WSNs …
broadcast communication. The selective forwarding attack, one of the inner attacks in WSNs …
LSTM-NV: A combined scheme against selective forwarding attack in event-driven wireless sensor networks under harsh environments
X Huang, S Li, Y Wu - Engineering Applications of Artificial Intelligence, 2023 - Elsevier
Abstract Wireless Sensor Networks (WSNs) are susceptible to selective forwarding attacks,
which can lead to reduced network efficiency and compromise the integrity of transmitted …
which can lead to reduced network efficiency and compromise the integrity of transmitted …
Gd3n: Adaptive clustering-based detection of selective forwarding attacks in wsns under variable harsh environments
H Wang, X Huang, Y Wu - Information Sciences, 2024 - Elsevier
Wireless sensor networks (WSNs) are susceptible to numerous security threats due to their
reliance on open environments and broadcast communication methods. Among these, the …
reliance on open environments and broadcast communication methods. Among these, the …