Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks

被引:0
|
作者
Al-Sarawi, Shadi [1 ]
Anbar, Mohammed [1 ]
Alabsi, Basim Ahmad [2 ]
Aladaileh, Mohammad Adnan [3 ]
Rihan, Shaza Dawood Ahmed [2 ]
机构
[1] National Advanced IPv6 Centre (NAv6), University Sains Malaysia, Penang, Gelugor,11800, Malaysia
[2] Applied College, Najran University, King Abdulaziz Street, P.O. Box 1988, Najran, Saudi Arabia
[3] Cybersecurity Department, School of Information Technology, American University of Madaba (AUM), Amman,11821, Jordan
来源
Computers, Materials and Continua | 2023年 / 77卷 / 01期
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Denial-of-service attack - Electric power utilization - Internet of things - Internet protocols - Intrusion detection - Low power electronics - Network security - Personal communication systems - Power management (telecommunication) - Sensor nodes
引用
收藏
页码:491 / 515
相关论文
共 50 条
  • [21] A reputation-based RPL protocol to detect selective forwarding attack in Internet of Things
    Patel, Anshuman
    Jinwala, Devesh
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (01)
  • [22] A Central Intrusion Detection System for RPL-Based Industrial Internet of Things
    Aydogan, Emre
    Yilmaz, Selim
    Sen, Sevil
    Butun, Ismail
    Forsstrom, Stefan
    Gidlund, Mikael
    2019 15TH IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS (WFCS), 2019,
  • [23] Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of Things
    Ioulianou, Philokypros P.
    Vassilakis, Vassilios G.
    COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 374 - 390
  • [24] Detection of malicious packet dropping attacks in RPL-based internet of things
    Shin, Sooyeon
    Kim, Kyounghoon
    Kwon, Taekyoung
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2019, 31 (02) : 133 - 141
  • [25] Securing RPL-Based Internet of Things applied for water pipeline monitoring
    Elleuchi, Manel
    Boujeleben, Manel
    Abid, Mohamed
    BenSaleh, Mohammed S.
    2017 25TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2017, : 404 - 410
  • [26] Replay attacks in RPL-based Internet of Things: Comparative and empirical study
    Albinali, Hussah
    Azzedin, Farag
    COMPUTER NETWORKS, 2025, 257
  • [27] An Anomaly-Based IDS for Detecting Attacks in RPL-Based Internet of Things
    Farzaneh, Behnam
    Montazeri, Mohammad Ali
    Jamali, Shahram
    2019 5TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2019, : 61 - 66
  • [28] IDS to Detect Worst Parent Selection Attack in RPL-Based IoT Network
    Kiran, Usha
    2022 14th International Conference on COMmunication Systems and NETworkS, COMSNETS 2022, 2022, : 769 - 773
  • [29] Provenance-enabled packet path tracing in the RPL-based internet of things
    Suhail, Sabah
    Hussain, Rasheed
    Abdellatif, Mohammad
    Pandey, Shashi Raj
    Khan, Abid
    Hong, Choong Seon
    COMPUTER NETWORKS, 2020, 173
  • [30] Exploring and mitigating hybrid rank attack in RPL-based IoT networks
    Rouissat, Mehdi
    Belkehir, Mohammed
    Mokaddem, Allel
    Bouziani, Merahi
    Alsukayti, Ibrahim Sulaiman
    JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2024, 75 (03): : 204 - 213