Security explorations for routing attacks in low power networks on internet of things

S Sharma, VK Verma - The Journal of Supercomputing, 2021 - Springer
The routing protocol for low power and lossy networks works as an effective method for
communication in Contiki. However, many security attacks exist in RPL. These attacks affect …

Blackhole attack impact analysis on low power lossy networks

N Panda, M Supriya - 2022 IEEE 3rd Global Conference for …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is a network of low-power, low-latency devices that are
becoming smart day by day. The market sees a tremendous rise in the demand for IoT …

Intrusion prevention scheme against rank attacks for software-defined low power IoT networks

C Miranda, G Kaddoum, A Boukhtouta, T Madi… - IEEE …, 2022 - ieeexplore.ieee.org
The 6LoWPAN (IPv6 over low-power wireless personal area networks) standard enables
resource-constrained devices to connect to the IPv6 network, blending an IPv6 header …

Cyber Security Attack Detection Framework for DODAG Control Message Flooding in an IoT Network

J Miller, L Egharevba, Y Hariprasad, KKJ Latesh… - … on Information Security …, 2022 - Springer
Advancement in the IoT technologies and the futuristic device's usage influences the human
life in all the aspects of day-to-day activities. Moreover, human reliance on smart objects …

[PDF][PDF] Game theory based resource identification scheme for wireless sensor networks

GS Kori, MS Kakkasageri - International Journal of Intelligent …, 2022 - academia.edu
In modern world of sensing and distributive systems, traditional Wireless Sensor Networks
(WSN) has to deal with new challenges, such as multiple application requirements, dynamic …

[PDF][PDF] Design of a minimal overhead control traffic topology discovery and data forwarding protocol for software-defined wireless sensor networks

SA Asakipaam, JJ Kponyo, JO Agyemang… - Int. J. Commun. Netw …, 2020 - academia.edu
Software-defined networking is a novel concept that is ported into wireless sensor networks
to make them more manageable and customizable. unfortunately, the topology discovery …

Sensor networks simulation framework for target tracking applications: SN-SiFTTA

AR Rababaah - International Journal of Web Engineering …, 2021 - inderscienceonline.com
This work presents a new simulation framework for wireless sensor networks dedicated for
target tracking applications named: SN-SiFTTA. SiFTTA does not address routing protocols …

Security framework for software defined wireless networks

C Miranda - 2023 - espace.etsmtl.ca
The fifth generation (5G) of wireless networks are very complex infrastructures due to their
new services and the augmentation of the density of connected devices. The 3rd Generation …

Comparative Analysis of a Secure Authentication Protocol for 5G-Enabled IoT Network Using Public and Shared Secret Key

VB Pattanashetty - Smart Trends in Computing and Communications, 2023 - Springer
Due to advancements in technologies and to achieve high efficiency, the world is shifting
from 4G to a 5G network. The advantages of 5G network are enormous in every field and …

[PDF][PDF] Secure Communication Protocols for IoT Networks

A Singh, P Dhiman - 2024 - ir.juit.ac.in
In an age where the Internet of Things (IoT) is prevalent and gadgets collaborate to better
our lives, the security and integrity of these connections are crucial. The purpose of this …