Zitieren

X. Mu and M. F. Antwi-Afari, “The applications of Internet of Things (IoT) in industrial management: a science mapping review,” International Journal of Production Research, vol. 62, no. 5, pp. 1928–1952, Dec. 2023, doi: 10.1080/00207543.2023.2290229. Search in Google Scholar

R. Chataut, A. Phoummalayvane, and R. Akl, “Unleashing the Power of IoT: A Comprehensive Review of IoT Applications and Future Prospects in Healthcare, Agriculture, Smart Homes, Smart Cities, and Industry 4.0,” Sensors, vol. 23, no. 16, p. 7194, Aug. 2023, doi: 10.3390/s23167194. Search in Google Scholar

M. Albreem, A.M. Sheikh and A.E. Ayman, “Towards a Sustainable Environment with a Green IoT: An Overview,”. 2022 International Conference on Computer Technologies (ICCTech), 2017, doi: 10.1109/ICCTech55650.2022.00017. Search in Google Scholar

P. Gkonis, A. Giannopoulos, P. Trakadas, X. Masip-Bruin, and F. D’Andria, “A Survey on IoT-Edge-Cloud Continuum Systems: Status, Challenges, Use Cases, and Open Issues,” Future Internet, vol. 15, no. 12, p. 383, Nov. 2023, doi: 10.3390/fi15120383. Search in Google Scholar

S. Syaifuddin, S. S. Kusumawardani, and W. Widyawan, “Tackling DDOS Attacks in IoT: Asynthesis of Literature 2018 to 2022”, Int J Intell Syst Appl Eng, vol. 12, no. 1, pp. 802–809, Dec. 2023 Search in Google Scholar

A. Heidari and M. A. Jabraeil Jamali, “Internet of Things intrusion detection systems: a comprehensive review and future directions,” Cluster Computing, vol. 26, no. 6, pp. 3753–3780, Oct. 2022, doi: 10.1007/s10586-022-03776-z. Search in Google Scholar

N. A. Alfriehat, M. Anbar, S. Karuppayah, S. D. A. Rihan, B. A. Alabsi, and A. M. Momani, “Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy,” IEEE Access, vol. 12, pp. 31136–31158, 2024, doi: 10.1109/access.2024.3368633. Search in Google Scholar

H. Almutairi and N. Zhang, “A Survey on Routing Solutions for Low-Power and Lossy Networks: Toward a Reliable PathFinding Approach,” Network, vol. 4, no. 1, pp. 1–32, Jan. 2024, doi: 10.3390/network4010001. Search in Google Scholar

A. El Hajjar, “Key-Pre Distribution for the Internet of Things Challenges, Threats and Recommendations,” Wireless Networks, pp. 1–42, 2023, doi: 10.1007/978-3-031-33631-7_1. Search in Google Scholar

I. S. Alsukayti and M. Alreshoodi, “Toward an understanding of recent developments in RPL routing,” IET Networks, vol. 8, no. 6, pp. 356–366, Nov. 2019, doi: 10.1049/iet-net.2018.5167. Search in Google Scholar

M. Rouissat, M. Belkheir, H. S. A. Belkhira, S. Boukli Hacene, P. Lorenz, and M. Bouziani, “A new lightweight decentralized mitigation solution against Version Number Attacks for IoT Networks,” JUCS - Journal of Universal Computer Science, vol. 29, no. 2, pp. 118–151, Feb. 2023, doi: 10.3897/jucs.85506. Search in Google Scholar

P. Levis, T. Clausen, J. Hui, O. Gnawali, and J. Ko, “The Trickle Algorithm,” Mar. 2011, doi: 10.17487/rfc6206. Search in Google Scholar

A. Hkiri, M. Karmani, O. B. Bahri, A. M. Murayr, F. H. Alasmari, and M. Machhout, “RPL-Based IoT Networks under Decreased Rank Attack: Performance Analysis in Static and Mobile Environments,” Computers, materials and continua (Print), Jan. 01, 2023. doi : 10.32604/cmc.2023.047087. Search in Google Scholar

M. Rouissat, M. Belkheir, H. S. A. Belkhira, A. Mokaddem, and D. Ziani, “Implementing and evaluating a new Silent Rank Attack in RPL-Contiki based IoT networks,” Journal of Electrical Engineering, vol. 74, no. 6, pp. 454–462, Dec. 2023, doi: 10.2478/jee-2023-0053. Search in Google Scholar

F. Zahra, N. Jhanjhi, S. N. Brohi, N. A. Khan, M. Masud, and M. A. AlZain, “Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning,” Sensors, vol. 22, no. 18, p. 6765, Sep. 2022, doi: 10.3390/s22186765. Search in Google Scholar

M.M Savitha, and P.I Basarkod, “Securing AMI-IoT networks against multiple RPL attacks using ensemble learning IDS and lightchain based prediction detection and mitigation mechanisms,” Information Security Journal: A Global Perspective, vol. 33, no. 1, pp. 73–95, Jun. 2023, doi: 10.1080/19393555.2023.2218852. Search in Google Scholar

A. O. Bang and U. P. Rao, “EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things,” Peer-to-Peer Networking and Applications, vol. 15, no. 1, pp. 642–665, Jan. 2022, doi: 10.1007/s12083-021-01275-3. Search in Google Scholar

P. S. Nandhini, S. Kuppuswami, S. Malliga, and R. DeviPriya, “Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers,” The Journal of Supercomputing, vol. 79, no. 6, pp. 6825–6848, Nov. 2022, doi: 10.1007/s11227-022-04921-6. Search in Google Scholar

M. Rouissat, M. Belkheir, I. S. Alsukayti, and A. Mokaddem, “A Lightweight Mitigation Approach against a New Inundation Attack in RPL-Based IoT Networks,” Applied Sciences, vol. 13, no. 18, p. 10366, Sep. 2023, doi: 10.3390/app131810366. Search in Google Scholar

M. Osman, J. He, F. M. M. Mokbal, N. Zhu, and S. Qureshi, “ML-LGBM: A Machine Learning Model Based on Light Gradient Boosting Machine for the Detection of Version Number Attacks in RPL-Based Networks,” IEEE Access, vol. 9, pp. 83654–83665, 2021, doi: 10.1109/access.2021.3087175. Search in Google Scholar

W. Choukri, H. Lamaazi, N. Benamar, “RPL rank attack detection using Deep Learning”. 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies, 2020 Search in Google Scholar

A. M. Said, A. Yahyaoui, F. Yaakoubi, and T. Abdellatif, “Machine Learning Based Rank Attack Detection for Smart Hospital Infrastructure,” Lecture Notes in Computer Science, pp. 28–40, 2020, doi: 10.1007/978-3-030-51517-1_3. Search in Google Scholar

S. M. Muzammal, R. K. Murugesan, N. Z. Jhanjhi, M. Humayun, A. O. Ibrahim, and A. Abdelmaboud, “A TrustBased Model for Secure Routing against RPL Attacks in Internet of Things,” Sensors, vol. 22, no. 18, p. 7052, Sep. 2022, doi: 10.3390/s22187052. Search in Google Scholar

M. A. Boudouaia, A. Abouaissa, A. Ali‐Pacha, A. Benayache, and P. Lorenz, “RPL rank based‐attack mitigation scheme in IoT environment,” International Journal of Communication Systems, vol. 34, no. 13, Jul. 2021, doi: 10.1002/dac.4917. Search in Google Scholar

M. Saied, S. Guirguis, and M. Madbouly, “Review of artificial intelligence for enhancing intrusion detection in the internet of things,” Engineering Applications of Artificial Intelligence, vol. 127, p. 107231, Jan. 2024, doi: 10.1016/j.engappai.2023.107231. Search in Google Scholar

eISSN:
1339-309X
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
6 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Technik, Einführungen und Gesamtdarstellungen, andere