Department of Computer Science and Applications, Adhiparasakthi College of Arts and Science (Autonomous), (Affiliated to Thiruvalluvar university, Vellore)India
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Muzammal, S. M., Murugesan, R. K., Jhanjhi, N., Hossain, M. S., & Yassine, A. (2022). Trust and mobility-based protocol for secure routing in Internet of Things. Sensors, 22(16), 6215. https://doi.org/10.3390/s22166215MuzammalS. M.MurugesanR. K.JhanjhiN.HossainM. S.YassineA.2022Trust and mobility-based protocol for secure routing in Internet of ThingsSensors22166215https://doi.org/10.3390/s22166215Search in Google Scholar
Muzammal, S. M., Murugesan, R. K., Jhanjhi, N. Z., Humayun, M., Ibrahim, A. O., & Abdelmaboud, A. (2022). A trust-based model for secure routing against RPL attacks in Internet of Things. Sensors, 22(18), 7052. https://doi.org/10.3390/s22187052MuzammalS. M.MurugesanR. K.JhanjhiN. Z.HumayunM.IbrahimA. O.AbdelmaboudA.2022A trust-based model for secure routing against RPL attacks in Internet of ThingsSensors22187052https://doi.org/10.3390/s22187052Search in Google Scholar
Bang, A. O., & Rao, U. P. (2022). EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based Internet of Things. Peer-to-Peer Networking and Applications, 15, 642–665.BangA. O.RaoU. P.2022EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based Internet of ThingsPeer-to-Peer Networking and Applications15642665Search in Google Scholar
Singh, J., Dhurandher, S. K., Woungang, I., & Chao, H.-C. (2024). Context-aware trust and reputation routing protocol for opportunistic IoT networks. Sensors, 24(23), 7650. https://doi.org/10.3390/s24237650SinghJ.DhurandherS. K.WoungangI.ChaoH.-C.2024Context-aware trust and reputation routing protocol for opportunistic IoT networksSensors24237650https://doi.org/10.3390/s24237650Search in Google Scholar
Jiang, J., & Liu, Y. (2022). Secure IoT routing: Selective forwarding attacks and trust-based defenses in RPL network. arXiv preprint, arXiv:2201.06937.JiangJ.LiuY.2022Secure IoT routing: Selective forwarding attacks and trust-based defenses in RPL networkarXiv preprint
arXiv:2201.06937.
Search in Google Scholar
Rashidibajgan, S., Hupperich, T., Doss, R., & Förster, A. (2021). Secure and privacy-preserving structure in opportunistic networks. Computers & Security, 104, 102208.RashidibajganS.HupperichT.DossR.FörsterA.2021Secure and privacy-preserving structure in opportunistic networksComputers & Security104102208Search in Google Scholar
Cai, X., Shi, K., Sun, Y., Cao, J., Wen, S., & Tian, Z. (2023). Intelligent event-triggered control supervised by mini-batch machine learning and data compression mechanism for TS fuzzy NCSs under DoS attacks. IEEE Transactions on Fuzzy Systems, 32, 804–815.CaiX.ShiK.SunY.CaoJ.WenS.TianZ.2023Intelligent event-triggered control supervised by mini-batch machine learning and data compression mechanism for TS fuzzy NCSs under DoS attacksIEEE Transactions on Fuzzy Systems32804815
Search in Google Scholar
Sreenivasa, B. R., Lahza, H., Nandini, G., Shawly, T., Alsheikhy, A. A., Kumar, K. R. N., & Lahza, M. H. F. (2023). Social context-aware macroscopic routing scheme for opportunistic network. Transactions on Emerging Telecommunications Technologies, 34, e4844.SreenivasaB. R.LahzaH.NandiniG.ShawlyT.AlsheikhyA. A.KumarK. R. N.LahzaM. H. F.2023Social context-aware macroscopic routing scheme for opportunistic networkTransactions on Emerging Telecommunications Technologies34
e4844
Search in Google Scholar
Malik, R. A. (2023). A social relationship-based energy-efficient routing scheme for Opportunistic Internet of Things. ICT Express, 9, 697–705.MalikR. A.2023A social relationship-based energy-efficient routing scheme for Opportunistic Internet of ThingsICT Express9697705Search in Google Scholar
Abadía, J. J. P., et al. (2022). A systematic survey of Internet of Things frameworks for smart city applications. Sustainable Cities and Society, 103949.AbadíaJ. J. P.2022A systematic survey of Internet of Things frameworks for smart city applicationsSustainable Cities and Society
103949
Search in Google Scholar
Abosata, N., Al-Rubaye, S., & Inalhan, G. (2023). Customised intrusion detection for an industrial IoT heterogeneous network based on machine learning algorithms called FTL-CID. Sensors, 23(1), 321.AbosataN.Al-RubayeS.InalhanG.2023Customised intrusion detection for an industrial IoT heterogeneous network based on machine learning algorithms called FTL-CIDSensors231321Search in Google Scholar
Arshad, D., et al. (2022). THC-RPL: A lightweight trust-enabled routing in RPL-based IoT networks against Sybil attack. PLoS One, 17(7), e0271277.ArshadD.2022THC-RPL: A lightweight trust-enabled routing in RPL-based IoT networks against Sybil attackPLoS One17
7
e0271277
Search in Google Scholar
Gothawal, D. B., & Nagaraj, S. V. (2023). An intelligent and lightweight intrusion detection mechanism for RPL routing attacks by applying automata model. Information Security Journal: A Global Perspective, 32(1), 1–20.GothawalD. B.NagarajS. V.2023An intelligent and lightweight intrusion detection mechanism for RPL routing attacks by applying automata modelInformation Security Journal: A Global Perspective321120Search in Google Scholar
Ioulianou, P. P., Vassilakis, V. G., & Shahandashti, S. F. (2022). A trust-based intrusion detection system for RPL networks: Detecting a combination of rank and blackhole attacks. Journal of Cybersecurity and Privacy, 2(1), 124–153.IoulianouP. P.VassilakisV. G.ShahandashtiS. F.2022A trust-based intrusion detection system for RPL networks: Detecting a combination of rank and blackhole attacksJournal of Cybersecurity and Privacy21124153Search in Google Scholar
Khan, A. B. F., Lalitha, H. R., Devi, S. K., & Rajalakshmi, C. N. (2022). A multi-attribute based trusted routing for embedded devices in MANET-IoT. Microprocessors and Microsystems, 89, 104446. https://doi.org/10.1016/j.micpro.2022.104446KhanA. B. F.LalithaH. R.DeviS. K.RajalakshmiC. N.2022A multi-attribute based trusted routing for embedded devices in MANET-IoTMicroprocessors and Microsystems89104446https://doi.org/10.1016/j.micpro.2022.104446Search in Google Scholar
Ali, A. A., Hussain, M. M., & Rao, A. S. (2024). Enhancing security in the Internet of Things: A trust-based protocol for resilient communication. SN Computer Science, 5, 4. https://doi.org/10.1007/s42979-023-02329-4AliA. A.HussainM. M.RaoA. S.2024Enhancing security in the Internet of Things: A trust-based protocol for resilient communicationSN Computer Science54https://doi.org/10.1007/s42979-023-02329-4Search in Google Scholar
Khan, A. B. F., Hussain, M. M., Devi, S. K., & Gunavathie, M. A. (2023). DDoS attack modeling and resistance using trust-based protocol for the security of Internet of Things. Journal of Engineering Research, 11(2), 100058. https://doi.org/10.1016/j.jer.2023.100058KhanA. B. F.HussainM. M.DeviS. K.GunavathieM. A.2023DDoS attack modeling and resistance using trust-based protocol for the security of Internet of ThingsJournal of Engineering Research112100058https://doi.org/10.1016/j.jer.2023.100058Search in Google Scholar
Mansour M., Gamal A., Ahmed A., said L., Herencsar A. E. N., and Soltan A., Internet of Things: A Comprehensive Overview on Protocols, Architectures, Technologies, Simulation Tools, and Future Directions, Energies. (2023) 16, no. 8, https://doi.org/10.3390/en16083465, 3465.MansourM.GamalA.AhmedA.saidL.HerencsarA. E. N.SoltanA.
Internet of Things: A Comprehensive Overview on Protocols, Architectures, Technologies, Simulation Tools, and Future Directions
Energies
2023
16
8
https://doi.org/10.3390/en16083465
3465
Search in Google Scholar
Park H., Song S., Nguyen T., and Park L., Machine Learning for Internet of Things: Applications and Discussion, 2024 International Conference on Artificial Intelligence in Information and Communication, 2024.ParkH.SongS.NguyenT.ParkL.
Machine Learning for Internet of Things: Applications and Discussion
2024 International Conference on Artificial Intelligence in Information and Communication
2024
Search in Google Scholar
Shanmugapriya R. and Svn S. K., An Energy Efficient Swan Intelligent Based Clustering Technique (SICT) With Fuzzy Based Secure Routing Protocol in IoT, Peer-to-Peer Networking and Applications. (2024) 17, no. 4, 1830–1864, https://doi.org/10.1007/s12083-024-01670-6.ShanmugapriyaR.SvnS. K.
An Energy Efficient Swan Intelligent Based Clustering Technique (SICT) With Fuzzy Based Secure Routing Protocol in IoT
Peer-to-Peer Networking and Applications
2024
17
4
1830
1864https://doi.org/10.1007/s12083-024-01670-6Search in Google Scholar
Albinali H. and Azzedin F., Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach, IEEE Transactions on Network and Service Management. (2024) 21, no. 5, 5215– 5238, https://doi.org/10.1109/TNSM.2024.3386468.AlbinaliH.AzzedinF.
Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach
IEEE Transactions on Network and Service Management
2024
21
5
5215
5238https://doi.org/10.1109/TNSM.2024.3386468Search in Google Scholar
Burange A. W. and Deshmukh V. M., Trust Based Secured Routing System for Low Powered Networks, Journal of Integrated Science & Technology. (2023) 11.BurangeA. W.DeshmukhV. M.
Trust Based Secured Routing System for Low Powered Networks
Journal of Integrated Science & Technology
2023
11
Search in Google Scholar
Krari A., Hajami A., and Jarmouni E., Detecting the RPL Version Number Attack in IoT Networks Using Deep Learning Models, International Journal of Advanced Computer Science and Applications. (2023) 14, no. 10, https://doi.org/10.14569/IJACSA.2023.0141065.KrariA.HajamiA.JarmouniE.
Detecting the RPL Version Number Attack in IoT Networks Using Deep Learning Models
International Journal of Advanced Computer Science and Applications
2023
14
10https://doi.org/10.14569/IJACSA.2023.0141065Search in Google Scholar