A study on network routing attacks in IoT
Tài liệu tham khảo
Gubbi, 2013, IoT (IoT): A vision, architectural elements, and future directions, Future Generation Comput. Syst., 29, 1645, 10.1016/j.future.2013.01.010
Nir, 2017, The evolution of the IoT industry and market in China: an interplay of institutions, demands and supply, Telecommun. Policy, 41, 49, 10.1016/j.telpol.2016.11.002
Axelrod C. Warren, Enforcing security, safety and privacy for the IoT, in: Systems, Applications and Technology Conference (LISAT), 2015 IEEE Long Island, IEEE, 2015.
Pathak, 2016, IoT: an overview of the emerging technology, Res. Comput. Sci. Softw. Eng., 3, 167
Gaddour, 2015, Quality-of-service aware routing for static and mobile IPv6-based low-power and lossy sensor networks using RPL, Ad Hoc Netw., 33, 233, 10.1016/j.adhoc.2015.05.009
Olfa Gaddour, Anis Koubâa, Nouha Baccour, Mohamed Abid, OF-FL: QoS aware fuzzy logic objective function for the RPL routing protocol, in: Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2014 12th International Symposium on IEEE, 2014.
Pavkovic, 2014, Efficient topology construction for RPL over IEEE 802.15. 4 in wireless sensor networks, Ad Hoc Netw., 15, 25, 10.1016/j.adhoc.2013.08.009
FlathagenJoakim, A routing and cross-layering approach for energy and bandwidth efficiency in Wireless Sensor Networks, 2013.
Sobral José, 2016, Performance evaluation of LOADng routing protocol in IoT P2P and MP2P applications, 1
Coelho Tiago, António Costa, Joaquim Macedo, Maria JoãoNicolau, Improving Stability in QoS Routing for Ad-Hoc Networks, in: International Conference on Ad Hoc Networks, Springer, Cham, 2014, pp. 121–133.
Sasidharan Deepthi, Lillykutty Jacob, Energy and bandwidth efficient multipath-enhanced LOADng routing protocol, in: Communication (NCC), 2016 Twenty Second National Conference on. IEEE, 2016, pp. 1–6.
Cervantes, 2015, Detection of Sinkhole Attacks for Supporting Secure Routing on 6LoWPAN for IoT, IEEE International symposium on Integrated Network, 606
Shahid Raza, Linus Wallgren, Thiemo Voigt, SVELTE: Real-time intrusion detection in the IoT, pp. 1–13.
Anhtuan Le, Jonathan Loo, Kok Keong Chai, Mahdi Aiash, A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology, pp. 1–19.
R. Stephan, L. Arokiyam, RIAIDRPL: Rank Increased Attack (RIA) Identification Algorithm for Avoiding Loop in the RPL DODAG, Int. J. Pure Appl. Math 1203–1209.
Dharmini shreenivas, Shahid Raza, Thiemo voigt, Intrusion Detection in the RPL-connected 6LoWPAN Networks, pp. 31–38.
Pavan pongle, gurunath chavan, Real Time Intrusion and Wormhole Attack Detection in IoT, Int. J. Comput. Applications 121(9) (2015) 1–9.
Niki tsitstiroudi, panagioties sarigiannidis, Eirini karapistoli, EyeSim: A Mobile Application for Visual-Assisted Wormhole Attack Detection in IoT-enabled WSNs, 9th Wireless and Mobile Networking Conference 2016, pp. 1–7.
Nilima Nikam, Poorna R. Pimpale, Pranali Pawar, Anita Shirture, Detecting and Monitoring Wormhole in IoT enabled WSNs Using EyeSim, Int. J. Eng. Techn. Res. 7(6) (2017) 15–17.
Mehta, 2018, Trust, based mechanism for Securing IoT Routing Protocol RPL against Wormhole & Grayhole Attacks, IEEE, 1
Shukla, 2017, ML-IDS: A Machine Learning Approach to Detect Wormhole Attacks in IoT“ IEEE, Intell. Syst. Conf., 234
Sneha Deshmukh Bhosale, S.S. Sonavane, Wormhole attack detection in internet of things, Int. J. Eng. Technol. 749–751.
Chandra Sekhar Reddy, 2018, Implementation of Wormhole Attack on RPL Protocol in IoT, Int. J. Comput. Sci. Mobile Applications, 6, 63
Faraz Idris Khan, Taeshik Shon, Taekkyeun Lee, Kihyung Kim, Wormhole Attack prevention mechanism for RPL based LLN network, IEEE, pp. 149–154.
Airehrour, 2016, Securing RPL Routing Protocol from Blackhole Attacks Using a Trust-based Mechanism, International Telecommunication Networks and Applications Conference, 115
Pooja Chandel, Rakesh kumar, IoT for the Prevention of Black Hole Using Fingerprint Authentication and Genetic Algorithm Optimization, pp.17–26.
Jun Jiang, Yuhong Liu, Behnam Dezfouli, A Root-based Defense Mechanism Against RPL Blackhole Attacks in IoT Networks, pp.1194–1197.
M. Rajesh Babu, S. Moses Dian, Siva Chelladurai, Mathiyalagan Palaniappan, Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version, Sci. World J. 1–11.
Avijit Mathur, Thomas Newe, Muzaffar Rao, Defense against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT, pp. 1–25.
Firoz Ahmed, Young-Bae Ko, Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks, 5143–5154.
Atzori, 2010, The IoT: survey, Comput. Netw., 54, 2787, 10.1016/j.comnet.2010.05.010
Pallavi, 2017, IoT: architectures, protocols and applications, J. Electr. Comput. Eng.