Routing attacks and mitigation methods for RPL-based Internet of Things
The recent bloom of Internet of Things (IoT) and its prevalence in many security-sensitive
environments made the security of these networks a crucial requirement. Routing in many of …
environments made the security of these networks a crucial requirement. Routing in many of …
Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes
Advancement in technology with the proliferation of new wireless communication protocols
gave rise to the new era of ubiquitous computing, called Internet of Things (IoT). IoT …
gave rise to the new era of ubiquitous computing, called Internet of Things (IoT). IoT …
SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things
Abstract The Routing Protocol for Low-Power and Lossy Networks (RPL), the de facto
routing protocol for Internet of Things (IoT) offers little protection against various forms of …
routing protocol for Internet of Things (IoT) offers little protection against various forms of …
A taxonomy of machine-learning-based intrusion detection systems for the internet of things: A survey
The Internet of Things (IoT) is an emerging technology that has earned a lot of research
attention and technical revolution in recent years. Significantly, IoT connects and integrates …
attention and technical revolution in recent years. Significantly, IoT connects and integrates …
Trust-aware and cooperative routing protocol for IoT security
The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power
and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification …
and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification …
Assessment of routing attacks and mitigation techniques with RPL control messages: A survey
Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard routing protocol for
the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless …
the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless …
Trust management in industrial internet of things
C Boudagdigue, A Benslimane… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Automobile manufacturers around the world are increasingly deploying Industrial Internet of
Things (IIoT) devices in their factories to accompany the Industrial Revolution 4.0. Security …
Things (IIoT) devices in their factories to accompany the Industrial Revolution 4.0. Security …
Dynamic and comprehensive trust model for IoT and its integration into RPL
Ensuring security in IoT routing protocols is more challenging due to the fact that devices are
mobile, resource constrained, and heterogeneous. The routing protocol for low-power and …
mobile, resource constrained, and heterogeneous. The routing protocol for low-power and …
New trust metric for the RPL routing protocol
Establishing trust relationships between routing nodes represents a vital security
requirement to establish reliable routing processes that exclude infected or selfish nodes. In …
requirement to establish reliable routing processes that exclude infected or selfish nodes. In …
Security aspects for RPL-based protocols: A systematic review in IoT
The Internet of things (IoT) is a concept that has gained traction over the last decade. IoT
networks have evolved around the wireless sensor network (WSN), and the following …
networks have evolved around the wireless sensor network (WSN), and the following …