A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2023; you can also visit the original URL.
The file type is application/pdf
.
Filters
Blackhole attacks in internet of things networks: a review
2023
Indonesian Journal of Electrical Engineering and Computer Science
To solve this, RPL or routing protocol for low power Lossy network is deploy by utilizing a distance vector scheme. ...
IPv6 over low-power wireless personal area networks (6LoWPAN) is a one of IPv6 header pressure technology, and accordingly, it is vulnerable to attack. ...
ACKNOWLEDGEMENTS The authors would like to thank everyone who has contributed to this research, either directly or indirectly. ...
doi:10.11591/ijeecs.v30.i2.pp1080-1090
fatcat:wfeoyytdbnbbvaw355p5ojje6y
A Trust-Management-Based Intrusion Detection System for Routing Protocol Attacks in Internet of Things
2020
IJCI. International Journal of Computers and Information
In this paper an intrusion detection system is proposed for routing protocol for lossy and low power network attacks. ...
The objective of the proposed system is to detect a variety of routing attacks namely sinkhole, selective forward and blackhole attacks. ...
INTRODUCTION The Internet of things (IoT) systems are exposed to several attacks because of the huge number of connected devices and the nature of this devices which all operate in low power and lossy ...
doi:10.21608/ijci.2020.37546.1025
fatcat:uwlx7te3ybagjljpxnymmwvl2u
Secure Routing for MANET Connected Internet of Things Systems
2018
2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)
Routing protocols for multi-hop MANETs are analyzed with a focus on the standardized Routing Protocol for Low-power and Lossy Networks. ...
This paper presents a contemporary review of communication architectures and topographies for MANETconnected Internet-of-Things (IoT) systems. ...
The Routing Protocol for Low-power and Lossy Networks (RPL) has been proposed by the IETF Working Group ROLL WG [15] for LLN implementations based on 6LoWPAN. ...
doi:10.1109/ficloud.2018.00024
dblp:conf/ficloud/KarlssonDP18
fatcat:l235x2r7ezdbpiullyqw3rbwwu
Survey on Intrusion Detection System for various Attacks in IOT
2020
International Journal for Research in Applied Science and Engineering Technology
The network layer Routing Protocol for Low Power and Lossy Networks (RPL) is the routing protocol suspectable for various security attacks. ...
Samir Athmani [19] proposed an efficient Intrusion Detection System to detect blackhole attack in WSN is implemented NS2 network simulator. ...
IOT PROTOCOLS The protocols which are affected mostly are the Routing Protocol for Low-Power and Lossy-Network (RPL) and IPv6 over Low Power and Wireless Private Area Network (6LoWPAN).
A. ...
doi:10.22214/ijraset.2020.6231
fatcat:5r2datbuyfahphexq5nsennvpe
Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures
2019
IEEE Communications Surveys and Tutorials
., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. ...
Understanding these attacks and their associated defense mechanisms will help to pave a secure path towards the proliferation and public acceptance of IoT technology. ...
For this kind o networks, a new network layer routing protocol is designed called RPL (Routing Protocol for Low-power and lossy networks) [72] . ...
doi:10.1109/comst.2019.2953364
fatcat:wi7zt3goknciplqc2nhgqdfdei
A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks
2022
Journal of Cybersecurity and Privacy
Obtained results suggest that the SRF-IoT framework is an efficient and promising solution that combines trust-based and IDS-based approaches to protect IoT networks against routing attacks. ...
In this work, we study the impact of the combination of rank and blackhole attacks in the IPv6 routing protocol for low-power and lossy (RPL) networks, and we propose a new security framework for RPL-based ...
RPL Overview IPv6 routing protocol for low power and lossy networks (RPL) is a routing protocol used in IoT networks based on IPv6 [6] . ...
doi:10.3390/jcp2010009
fatcat:pui6yxq2bzeupi57p22hvqvtty
An Experimental Study of IoT Networks Under Internal Routing Attack
2020
Zenodo
The Internet Engineering Task Force (IETF) provides an effective IPv6-based LLN routing protocol, namely the IPv6 Routing Protocol for Low Power and Lossy Network (RPL). ...
Internet of Things (IoT) deployments mostly relies on the establishment of Low-Power and Lossy Networks (LLNs) among a large number of constraint devices. ...
Thus, Low-Power and Lossy Networks (LLNs) provide such a need with low-cost and less-complex deployments. ...
doi:10.5281/zenodo.4023803
fatcat:tnti27gnpbe3hfmhse22r3m24q
An Ultimate Approach of Mitigating Attacks in RPL Based Low Power Lossy Networks
[article]
2019
arXiv
pre-print
The Routing Protocol for Low-Power and Lossy Networks (RPL) is the existing routing protocol for Internet of Things (IoT). ...
So, we present an ultimate approach to mitigate these RPL attacks more efficiently and effectively. We use IDS based system for internal attacks and a mini-firewall for removing the external attacks. ...
INTRODUCTION In todays world, IoT is technical revolutionary area in mobile and wireless communication field which deploy Low power and Lossy Networks (LLN). ...
arXiv:1910.13435v2
fatcat:su5c24tc5fcbvhahtp4dmtod5i
A Data Driven Trust Mechanism Based on Blockchain in IoT Sensor Networks for Detection and Mitigation of Attacks
2021
Journal of Trends in Computer Science and Smart Technology
A data driven trust mechanism based on blockchain is presented in this paper as a decentralized and energy efficient solution for detection of internal attacks in IoT powered SNs. ...
Hazards due to internal and external attacks exist along with the advantages of the smart things and its applications. ...
In IoT networks with Routing Protocol for Low power and Lossy Networks (RPL), a trust-aware, time-based solution is provided to address the insider attacks [11] . ...
doi:10.36548/jtcsst.2021.1.006
fatcat:rkz6sgwnnnaufmpp5hzkx5w3ty
Enhancing Routing Security in IoT: Performance Evaluation of RPL Secure Mode under Attacks
[article]
2020
arXiv
pre-print
As the Routing Protocol for Low Power and Lossy Networks (RPL) became the standard for routing in the Internet of Things (IoT) networks, many researchers had investigated the security aspects of this protocol ...
First, a comparison of RPL performance, with and without its security mechanisms, under four routing attacks (Blackhole, Selective-Forward, Neighbor, and Wormhole attacks) is conducted using several metrics ...
Our previous work in [14] presented the first glimpse of the effects that RPL's security mechanisms could have on RPLbased IoT networks when there is an actual attack. ...
arXiv:2004.07815v2
fatcat:ikma4l67szetbjvnalche6uigi
E2V: Techniques for Detecting and Mitigating Rank Inconsistency Attack (RInA) in RPL based Internet of Things
2018
Journal of Physics, Conference Series
These devices are resource constrained and connected in the Low power and Lossy Networks (LLNs). ...
Due to this nature, the RPL (IPv6 Routing Protocol for Low power and Lossy networks) is primarily designed for the resource constrained devices. ...
The distance vector protocols are used in dynamic environment and RPL is used in static environment. RPL is an IP-based routing protocol for low power and lossy networks. ...
doi:10.1088/1742-6596/1142/1/012009
fatcat:mmeggdpk5jf2ljmndfr3cuw2sm
A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things
2020
IEEE Access
IoT devices are connected under the constraints of low power and lossy networks (LLNs), which are weak in energy, memory and processing capabilities. ...
IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) is low power and low-cost communication network, which makes IoT devices to be connected to the internet through IPv6. ...
doi:10.1109/access.2020.3037359
fatcat:pw4fsmelmjgc5anm7hp537l63e
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset
2020
Security and Communication Networks
One of the important features of routing protocol for low-power and lossy networks (RPLs) is objective function (OF). OF influences an IoT network in terms of routing strategies and network topology. ...
For this, we created a novel IoT dataset based on power and network metrics, which is deployed as part of an RPL IDS/IPS solution to enhance information security. ...
Routing protocol for low-power and lossy networks (RPLs) is used for IPv6 over low-power wireless personal area networks (6LoWPAN) and IoT networks. ...
doi:10.1155/2020/2804291
fatcat:rzigtgny4rhtjkgo7g5oldcasu
Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication
2020
Journal of Supercomputing
Because of wide openness, relatively high processing power, and wide distribution of IoT things, they are ideal for attacks of the gray hole. ...
The proposed approach consists of four phases, such as the verifying node trust in the IoT, testing the routes, gray hole attack discovery, and the malicious attack elimination process in MTISS-IoT. ...
In this work, a trust-oriented routing Protocol is provided for Lossy and Low-Power Networks stating blackhole and selective forwarding attacks. ...
doi:10.1007/s11227-019-03137-5
fatcat:g6cjxjfutrhh3ge3gxm2syeccm
Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review
2020
IEEE Sensors Journal
In RFC 6550, the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) is specified by IETF's ROLL working group for facilitating efficient routing in 6LoWPAN networks, while considering its limitations ...
Due to resource constrained nature of nodes in the IoT, RPL is vulnerable to many attacks that consume the node's resources and degrade the network's performance. ...
IETF Internet Engineering Task Force ROLL Routing Over Low power and Lossy Networks 6LoWPAN IPv6 over Low Power Wireless Personal Area Networks LLNs Low power and Lossy Networks CoAP Constrained Application ...
doi:10.1109/jsen.2020.2973677
fatcat:wuvv6cruwrdmzkkdc4gk7uhtvm
« Previous
Showing results 1 — 15 out of 86 results