RPL-based attack detection approaches in IoT networks: review and taxonomy

N Alfriehat, M Anbar, M Aladaileh, I Hasbullah… - Artificial Intelligence …, 2024‏ - Springer
Abstract The Routing Protocol for Low-Power and Lossy Networks (RPL) plays a crucial role
in the Internet of Things (IoT) and Wireless Sensor Networks. However, ensuring the RPL …

An overview of webassembly for iot: Background, tools, state-of-the-art, challenges, and future directions

PP Ray - Future Internet, 2023‏ - mdpi.com
This paper explores the relationship between two emerging technologies, WebAssembly
(Wasm) and the Internet of Things (IoT). It examines the complementary roles of these …

Contextual remediations prioritization system designed to implement theoretical principles of CVSS v4

O Grigorescu, LF Botezatu, A Mutu… - UPB Scientific Bulletin …, 2024‏ - ibn.idsi.md
Technological advancements have led to an unprecedented expansion in the number and
complexity of device interconnections. This brisk pace of adoption, while indicative of …

Securing smart home iot systems with attribute-based access control

G Goyal, P Liu, S Sural - Proceedings of the 2022 ACM Workshop on …, 2022‏ - dl.acm.org
Over the last few years, there has been an increased proliferation of IoT systems for smart
homes, enabling owners to remotely manage a variety of devices and gadgets installed on …

Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy

N Alfriehat, M Anbar, S Karuppayah, SDA Rihan… - IEEE …, 2024‏ - ieeexplore.ieee.org
The internet of things (IoT) is an emerging technological advancement with significant
implications. It connects a wireless sensor or node network via low-power and lossy …

Intelligent IoT Systems: security issues, attacks, and countermeasures

W Bekri, T Layeb, J Rihab… - … and Mobile Computing …, 2022‏ - ieeexplore.ieee.org
The Internet of things (IoT) growth has created a large spectrum of heterogeneous devices
where these devices produce a considerable amount of data every second. The produced …

[PDF][PDF] Considering webassembly containers for edge computing on hardware-constrained iot devices

J Napieralla - 2020‏ - diva-portal.org
Background. Container technologies allow us to make our code portable enough to run
properly and independently irrespective of the hardware architecture or operative system …

Congestion control model for securing internet of things data flow

M Quwaider, Y Shatnawi - Ad Hoc Networks, 2020‏ - Elsevier
Due to enormous amount of data in emerging Internet of Things (IoT) applications,
congestion control of traffic flow is very important to achieve certain level of security and …

[PDF][PDF] Emerging technology IoT and OT: overview, security threats, attacks and countermeasures

A Srivastava, A Agarwal - IJERT, 2021‏ - researchgate.net
Things (IoT) and Operational Technology (OT) with an emphasis on major security
challenges and attacks faced by these technologies. With increased deployment of IoT and …

Lightweight authentication scheme based on modified EAP security for CoAP protocol-based IoMT applications

PS Salankar, V Avasthi… - International Journal of …, 2023‏ - inderscienceonline.com
The medical data generated from the patients that are communicated and stored on servers
are highly sensitive, and also the IoMT network creates open spaces for an adversary. The …