RPL-based attack detection approaches in IoT networks: review and taxonomy

N Alfriehat, M Anbar, M Aladaileh, I Hasbullah… - Artificial Intelligence …, 2024 - Springer
Abstract The Routing Protocol for Low-Power and Lossy Networks (RPL) plays a crucial role
in the Internet of Things (IoT) and Wireless Sensor Networks. However, ensuring the RPL …

Detecting version number attacks in low power and lossy networks for internet of things routing: review and taxonomy

N Alfriehat, M Anbar, S Karuppayah, SDA Rihan… - IEEE …, 2024 - ieeexplore.ieee.org
The internet of things (IoT) is an emerging technological advancement with significant
implications. It connects a wireless sensor or node network via low-power and lossy …

RPL-based IoT networks under simple and complex routing security attacks: An experimental study

IS Alsukayti, M Alreshoodi - Applied Sciences, 2023 - mdpi.com
Effective security support still remains a challenge even for a standardized Internet of Things
network protocol such as the IPv6 Routing Protocol for Low-Power and Lossy Networks …

Detecting the RPL version number attack in IoT Networks using Deep Learning Models

A KRARI, A HAJAMI… - International Journal of …, 2023 - search.proquest.com
This research presents a novel approach for detecting the highly perilous RPL version
number attack in IoT networks using deep learning models, specifically Long Short-Term …

iTRPL: an intelligent and trusted RPL protocol based on multi-agent reinforcement learning

D Dey, N Ghosh - Ad Hoc Networks, 2024 - Elsevier
Abstract Routing Protocol for Low Power and Lossy Networks (RPL) is the de-facto routing
standard in IoT networks. It enables nodes to collaborate and autonomously build ad-hoc …

Hybrid Intrusion Detection System for RPL IoT Networks Using Machine Learning and Deep Learning

U Shahid, MZ Hussain, MZ Hasan, A Haider, J Ali… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is transforming everyday objects. However, its devices' limited
memory, processing power, and network capabilities make them susceptible to security …

Time Series Anomaly Detection with CNN for Environmental Sensors in Healthcare-IoT

MA Khatun, M Bhattacharya, C Eising… - 2024 IEEE 12th …, 2024 - ieeexplore.ieee.org
This research develops a new method to detect anomalies in time series data using
Convolutional Neural Net-works (CNNs) in healthcare-IoT. The proposed method creates a …

Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion

HSA Belkhira, M Belkheir, M Rouissat… - Open Information …, 2024 - degruyter.com
The security landscape of Internet of Things (IoT) networks continues to draw significant
attention from recent networks; the Version Number Attack (VNA) stands out as a prominent …

Impact analysis of hello flood attack on RPL

P Maurya, V Kushwaha - International Conference on Advanced Network …, 2022 - Springer
Abstract The Internet of Things (IoT) has a wide range of applications that improve our
quality of life with smart things that can connect without human intervention. However, IoT …

[PDF][PDF] Implementing and evaluating a new Silent Rank Attack in RPL-Contiki based IoT networks

M Rouissat, M Belkheir, HSA Belkhira… - Journal of Electrical …, 2023 - sciendo.com
IoT networks are witnessing a rapid growth in various domains of our daily life, offering more
attractive features in terms of measurement accuracy, easy implementation and affordable …