Djedjig et al., 2020 - Google Patents
Trust-aware and cooperative routing protocol for IoT securityDjedjig et al., 2020
View PDF- Document ID
- 873334303669443693
- Author
- Djedjig N
- Tandjaoui D
- Medjek F
- Romdhani I
- Publication year
- Publication venue
- Journal of Information Security and Applications
External Links
Snippet
The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to internal …
- 238000004088 simulation 0 abstract description 42
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Djedjig et al. | Trust-aware and cooperative routing protocol for IoT security | |
Selvi et al. | An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks | |
Airehrour et al. | SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things | |
Prathapchandran et al. | A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest–RFTRUST | |
Desai et al. | Secure routing in mobile Ad hoc networks: a predictive approach | |
Şen et al. | Intrusion detection in mobile ad hoc networks | |
Djedjig et al. | Trust-based RPL for the Internet of Things | |
Mythili et al. | SEAT-DSR: Spatial and energy aware trusted dynamic distance source routing algorithm for secure data communications in wireless sensor networks | |
Rani et al. | Review of trust models in wireless sensor networks | |
Alghamdi | Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud | |
Arul Selvan et al. | Malicious node identification using quantitative intrusion detection techniques in MANET | |
Bala et al. | An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis | |
Bang et al. | Impact analysis of rank attack on RPL-based 6LoWPAN networks in Internet of Things and aftermaths | |
Nunoo‐Mensah et al. | The adoption of socio‐and bio‐inspired algorithms for trust models in wireless sensor networks: A survey | |
Al Qurashi et al. | An architecture for resilient intrusion detection in ad-hoc networks | |
Dahane et al. | Energy efficient and safe weighted clustering algorithm for mobile wireless sensor networks | |
Thorat et al. | Opportunistic routing in presence of selfish nodes for MANET | |
Umarani et al. | Survey of various trust models and their behavior in wireless sensor networks | |
Kumar et al. | Trust-based fuzzy bat optimization algorithm for attack detection in manet | |
Alam et al. | Efficient and secure graph-based trust-enabled routing in vehicular ad-hoc networks | |
Aravindan et al. | Energy-aware multi-attribute trust modal for secure MANET-IoT environment | |
Sharma et al. | Design and analysis of energy efficient service discovery routing protocol in MANETs | |
Anand et al. | Advancing security and efficiency in MANET using dynamic algorithm switching | |
Sherif et al. | Detection and isolation of selfish nodes in manet using collaborative contact-based watchdog with chimp-aodv | |
N. Ahmed et al. | FSM-F: Finite state machine based framework for denial of service and intrusion detection in MANET |