Cite

M. Majid et al., “Applications of wireless sensor networks and internet of things frameworks in the industry revolution 4.0: A systematic literature review,” Sensors, vol. 22, no. 6, p. 2087, 2022. doi:10.3390/s22062087. Search in Google Scholar

S. M. Tahsien, H. Karimipour, and P. Spachos, “Machine learning based solutions for security of Internet of Things (IoT): A survey,” Journal of Network and Computer Applications, vol. 161, p. 102630, Jul. 2020, doi: https://doi.org/10.1016/j.jnca.2020.102630. Search in Google Scholar

M. Saleh et al., “Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks,” Computer Communications, vol. 183, pp. 33-50, Feb. 2022, doi: https://doi.org/10.1016/j.comcom.2021.11.010. Search in Google Scholar

A. Raghuvanshi, U. Kumar Singh, M. Shuaib, and S. Alam, “An investigation of various applications and related security challenges of Internet of things,” Materials Today: Proceedings, Mar. 2021, doi: https://doi.org/10.1016/j.matpr.2021.01.821. Search in Google Scholar

M. N. Khan, A. Rao, and S. Camtepe, “Lightweight Cryptographic Protocols for IoT Constrained Devices: A Survey,” IEEE Internet of Things Journal, pp. 4132-4156, 2020, doi: https://doi.org/10.1109/jiot.2020.3026493. Search in Google Scholar

V. Adat and B. B. Gupta, “Security in Internet of Things: issues, challenges, taxonomy, and architecture,” Telecommunication Systems, vol. 67, no. 3, pp. 423-441, Jun. 2017, doi: https://doi.org/10.1007/s11235-017-0345-9. Search in Google Scholar

J. Neeli and S. Patil, “Insight to Security Paradigm, Research Trend & Statistics in Internet of Things(IoT),” Global Transitions Proceedings, Jan. 2021, doi: https://doi.org/10.1016/j.gltp.2021.01.012. Search in Google Scholar

N. Miloslavskaya and A. Tolstoy, “Internet of Things: information security challenges and solutions,” Cluster Computing, vol. 22, no. 1, pp. 103-119, Jul. 2018, doi: https://doi.org/10.1007/s10586-018-2823-6. Search in Google Scholar

J. Howarth, “80+ Amazing IoT Statistics (2022-2030),” Exploding Topics, Dec. 22, 2021. https://explodingtopics.com/blog/iot-stats Search in Google Scholar

Liebermann. N, “2021 IoT Security Landscape - SAM Seamless Network,” Apr. 07, 2022. https://securingsam.com/2021-iot-security-landscape Search in Google Scholar

T. Winter, “RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks,” tools.ietf.org. https://tools.ietf.org/html/rfc6550 Search in Google Scholar

Gupta, M., Jain, S., & Patel, R. B, “Security issues in internet of things: principles, challenges, taxonomy. In: Singh, P.K., Singh, Y., Kolekar, M.H., Kar, A.K., Chhabra, J.K., Sen, A. (eds) Recent Innovations in Computing. ICRIC 2020. Lecture Notes in Electrical Engineering, Springer, Singapore 701. https://doi.org/10.1007/978-981-15-8297-4_52, 2021 Search in Google Scholar

R. R. Krishna, A. Priyadarshini, A. V. Jha, B. Appasani, A. Srinivasulu, and N. Bizon, “State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions,” Sustainability, vol. 13, no. 16, p. 9463, Jan. 2021, doi: https://doi.org/10.3390/su13169463. Search in Google Scholar

M. A. Boudouaia, A. Ali-Pacha, A. Abouaissa, and P. Lorenz, “Security Against Rank Attack in RPL Protocol,” IEEE Network, vol. 34, no. 4, pp. 133-139, Jul. 2020, doi: https://doi.org/10.1109/mnet.011.1900651. Search in Google Scholar

A. O. Bang and U. P. Rao, “EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things,” Peer-to-Peer Networking and Applications, vol. 15, no. 1, pp. 642-665, Jan. 2022, doi: https://doi.org/10.1007/s12083-021-01275-3. Search in Google Scholar

A. Seyfollahi, M. Moodi, and A. Ghaffari, “MFORPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications,” Computer Standards & Interfaces, vol. 82, p. 103622, Aug. 2022, doi: https://doi.org/10.1016/j.csi.2022.103622. Search in Google Scholar

P. P. Ioulianou, V. G. Vassilakis, and S. F. Shahandashti, “A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks,” Journal of Cyber-security and Privacy, vol. 2, no. 1, pp. 124-152, Mar. 2022, doi: https://doi.org/10.3390/jcp2010009. Search in Google Scholar

A. Agiollo, M. Conti, P. Kaliyar, T.-N. Lin, and L. Pajola, “DETONAR: Detection of Routing Attacks in RPL-Based IoT,” IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1178-1190, Jun. 2021, doi: https://doi.org/10.1109/tnsm.2021.3075496. Search in Google Scholar

Z. A. Almusaylim, N. Jhanjhi, and A. Alhumam, “Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP,” Sensors, vol. 20, no. 21, p. 5997, Oct. 2020, doi: https://doi.org/10.3390/s20215997. Search in Google Scholar

P. S. Nandhini, S. Kuppuswami, and S. Malliga, “Energy efficient thwarting rank attack from RPL based IoT networks: A review,” Materials Today: Proceedings, May 2021, doi: https://doi.org/10.1016/j.matpr.2021.04.167. Search in Google Scholar

A. Mayzaud, R. Badonnel, I, Chrisment, “A taxonomy of attacks in RPL-based internet of things”, International journal of network security, 18 (3), 459-473, 2016, DOI: 10.6633/IJNS.201605 Search in Google Scholar

H. Kumar Saini and M. Poriye, “Threats, Detection and Mitigation of Rank Attack: A Survey,” SSRN Electronic Journal, 2021, doi: https://doi.org/10.2139/ssrn.3884409. Search in Google Scholar

A. Le, J. Loo, A. Lasebae, A. Vinel, Y. Chen, and M. Chai, “The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks,” IEEE Sensors Journal, vol. 13, no. 10, pp. 3685-3692, Oct. 2013, doi: https://doi.org/10.1109/jsen.2013.2266399. Search in Google Scholar

M. Rouissat, M. Belkheir, and H. S. A. Belkhira, “A potential flooding version number attack against RPL based IOT networks,” Journal of Electrical Engineering, vol. 73, no. 4, pp. 267-275, Aug. 2022, doi: https://doi.org/10.2478/jee-2022-0035. Search in Google Scholar

M. Rouissat, M. Belkheir, I. S. Alsukayti, and A. Mokaddem, “A Lightweight Mitigation Approach against a New Inundation Attack in RPL-Based IoT Networks,” Applied Sciences, vol. 13, no. 18, p. 10366, Sep. 2023, doi: 10.3390/app131810366. Search in Google Scholar

P. Thubert, (2012, March). Objective function zero for the routing protocol for low-power and lossy networks (RPL). Internet Engineering Task Force. Retrieved July 20, 2022. http://www.ietf.org/rfc/rfc6552.txt Search in Google Scholar

O. Gnawali, P. Levis, (2012 September), The minimum rank with hysteresis objective function. Internet Engineering Task Force. Retrieved July 20, 2022. URL http://www.ietf.org/rfc/rfc6719.txt Search in Google Scholar

D. Airehrour, J. Gutierrez, and S. K. Ray, “Secure routing for internet of things: A survey,” Journal of Network and Computer Applications, vol. 66, pp. 198-213, May 2016, doi: https://doi.org/10.1016/j.jnca.2016.03.006. Search in Google Scholar

M. Amirinasab Nasab, S. Shamshirband, A. Chronopoulos, A. Mosavi, and N. Nabipour, “Energy-Efficient Method for Wireless Sensor Networks Low-Power Radio Operation in Internet of Things,” Electronics, vol. 9, no. 2, p. 320, Feb. 2020, doi: https://doi.org/10.3390/electronics9020320. Search in Google Scholar

S. S. Solapure and H. H. Kenchannavar, “Design and analysis of RPL objective functions using variant routing metrics for IoT applications,” Wireless Networks, vol. 26, no. 6, pp. 4637-4656, May 2020, doi: https://doi.org/10.1007/s11276-020-02348-6. Search in Google Scholar

R. Stephen, L. Arockiam, (2018) “RIAIDRPL: Rank Increased Attacks (RIA) Identification algorithm for avoiding loop in the RPL DODAg”, International Journal of Pure and Applied Mathematics, 119 (16), 1203-1210, 2018. Search in Google Scholar

eISSN:
1339-309X
Idioma:
Inglés
Calendario de la edición:
6 veces al año
Temas de la revista:
Engineering, Introductions and Overviews, other