[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Djedjig et al., 2020 - Google Patents

Trust-aware and cooperative routing protocol for IoT security

Djedjig et al., 2020

View PDF
Document ID
873334303669443693
Author
Djedjig N
Tandjaoui D
Medjek F
Romdhani I
Publication year
Publication venue
Journal of Information Security and Applications

External Links

Snippet

The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to internal …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Similar Documents

Publication Publication Date Title
Djedjig et al. Trust-aware and cooperative routing protocol for IoT security
Selvi et al. An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks
Airehrour et al. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things
Prathapchandran et al. A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest–RFTRUST
Desai et al. Secure routing in mobile Ad hoc networks: a predictive approach
Şen et al. Intrusion detection in mobile ad hoc networks
Djedjig et al. Trust-based RPL for the Internet of Things
Mythili et al. SEAT-DSR: Spatial and energy aware trusted dynamic distance source routing algorithm for secure data communications in wireless sensor networks
Rani et al. Review of trust models in wireless sensor networks
Alghamdi Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud
Arul Selvan et al. Malicious node identification using quantitative intrusion detection techniques in MANET
Bala et al. An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis
Bang et al. Impact analysis of rank attack on RPL-based 6LoWPAN networks in Internet of Things and aftermaths
Nunoo‐Mensah et al. The adoption of socio‐and bio‐inspired algorithms for trust models in wireless sensor networks: A survey
Al Qurashi et al. An architecture for resilient intrusion detection in ad-hoc networks
Dahane et al. Energy efficient and safe weighted clustering algorithm for mobile wireless sensor networks
Thorat et al. Opportunistic routing in presence of selfish nodes for MANET
Umarani et al. Survey of various trust models and their behavior in wireless sensor networks
Kumar et al. Trust-based fuzzy bat optimization algorithm for attack detection in manet
Alam et al. Efficient and secure graph-based trust-enabled routing in vehicular ad-hoc networks
Aravindan et al. Energy-aware multi-attribute trust modal for secure MANET-IoT environment
Sharma et al. Design and analysis of energy efficient service discovery routing protocol in MANETs
Anand et al. Advancing security and efficiency in MANET using dynamic algorithm switching
Sherif et al. Detection and isolation of selfish nodes in manet using collaborative contact-based watchdog with chimp-aodv
N. Ahmed et al. FSM-F: Finite state machine based framework for denial of service and intrusion detection in MANET