Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks

被引:0
|
作者
Al-Sarawi, Shadi [1 ]
Anbar, Mohammed [1 ]
Alabsi, Basim Ahmad [2 ]
Aladaileh, Mohammad Adnan [3 ]
Rihan, Shaza Dawood Ahmed [2 ]
机构
[1] National Advanced IPv6 Centre (NAv6), University Sains Malaysia, Penang, Gelugor,11800, Malaysia
[2] Applied College, Najran University, King Abdulaziz Street, P.O. Box 1988, Najran, Saudi Arabia
[3] Cybersecurity Department, School of Information Technology, American University of Madaba (AUM), Amman,11821, Jordan
来源
Computers, Materials and Continua | 2023年 / 77卷 / 01期
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Denial-of-service attack - Electric power utilization - Internet of things - Internet protocols - Intrusion detection - Low power electronics - Network security - Personal communication systems - Power management (telecommunication) - Sensor nodes
引用
收藏
页码:491 / 515
相关论文
共 50 条
  • [31] A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things
    Patel, Anshuman
    Jinwala, Devesh
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (04) : 1 - 17
  • [32] RPL-based attack detection approaches in IoT networks: review and taxonomy
    Alfriehat, Nadia
    Anbar, Mohammed
    Aladaileh, Mohammed
    Hasbullah, Iznan
    Shurbaji, Tamarah A.
    Karuppayah, Shankar
    Almomani, Ammar
    ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (09)
  • [33] Collaborative Detection and Prevention of Sybil Attacks against RPL-Based Internet of Things
    Khan, Muhammad Ali
    Bin Rais, Rao Naveed
    Khalid, Osman
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (01): : 827 - 843
  • [34] SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism
    Zaminkar, Mina
    Fotohi, Reza
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (02) : 1287 - 1312
  • [35] SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism
    Mina Zaminkar
    Reza Fotohi
    Wireless Personal Communications, 2020, 114 : 1287 - 1312
  • [36] The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things
    Verma, Abhishek
    Ranga, Virender
    COMPUTING, 2021, 103 (07) : 1479 - 1500
  • [37] The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things
    Abhishek Verma
    Virender Ranga
    Computing, 2021, 103 : 1479 - 1500
  • [38] Security Attacks and Secure Routing Protocols in RPL-based Internet of Things: Survey
    Kamble, Arvind
    Malemath, Virendra S.
    Patil, Deepika
    2017 INTERNATIONAL CONFERENCE ON EMERGING TRENDS & INNOVATION IN ICT (ICEI), 2017, : 33 - 39
  • [39] Addressing the DAO Insider Attack in RPL's Internet of Things Networks
    Ghaleb, Baraq
    Al-Dubai, Ahmed
    Ekonomou, Elias
    Qasem, Mamoun
    Romdhani, Imed
    Mackenzie, Lewis
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (01) : 68 - 71
  • [40] Mitigating the worst parent attack in RPL based internet of things
    Sahay, Rashmi
    Geethakumari, G.
    Mitra, Barsha
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (02): : 1303 - 1320