Bang et al., 2023 - Google Patents
Impact analysis of rank attack on RPL-based 6LoWPAN networks in Internet of Things and aftermathsBang et al., 2023
- Document ID
- 9999880689267160621
- Author
- Bang A
- Rao U
- Publication year
- Publication venue
- Arabian Journal for Science and Engineering
External Links
Snippet
Routing protocol for low power and lossy networks (RPL) serves the routing process in Internet Protocol version 6 over low-power wireless personal area network protocol stack. RPL protocol is deployed on sensor nodes and is vulnerable to many attacks due to the …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Verma et al. | Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review | |
Pasikhani et al. | Intrusion detection systems in RPL-based 6LoWPAN: A systematic literature review | |
Le et al. | 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach | |
Şen et al. | Intrusion detection in mobile ad hoc networks | |
Meng et al. | A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks | |
Latif et al. | Distributed denial of service (DDoS) attack in cloud-assisted wireless body area networks: a systematic literature review | |
Bang et al. | Impact analysis of rank attack on RPL-based 6LoWPAN networks in Internet of Things and aftermaths | |
Smith et al. | Battery draining attacks against edge computing nodes in IoT networks | |
Bang et al. | EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things | |
Ioulianou et al. | Denial-of-service attacks and countermeasures in the RPL-based Internet of Things | |
Bang et al. | A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case | |
Sharma et al. | Performance evaluation of mobile RPL-based IoT networks under version number attack | |
Khan et al. | A secure and dependable trust assessment (SDTS) scheme for industrial communication networks | |
Anand et al. | Trust based DoS attack detection in wireless sensor networks for reliable data transmission | |
Liang et al. | A dynamic source routing protocol based on path reliability and link monitoring repair | |
Su et al. | A hybrid entropy and blockchain approach for network security defense in SDN-based IIoT | |
Azzedin | Mitigating denial of service attacks in RPL-based IoT environments: trust-based approach | |
Nazaralipoorsoomali et al. | Performance improvement of routing protocol for low‐power and lossy networks protocol in an internet of things‐based smart retail system | |
Sahay et al. | A holistic framework for prediction of routing attacks in IoT-LLNs | |
Nandhini et al. | Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers | |
Dhulipala et al. | Trust management technique in wireless sensor networks: challenges and issues for reliable communication: a review | |
Alyami et al. | Fragmentation attacks and countermeasures on 6LoWPAN internet of things networks: Survey and simulation | |
Albinali et al. | Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach | |
Nandhini et al. | Directed acyclic graph inherited attacks and mitigation methods in RPL: a review | |
Abidoye et al. | Lightweight models for detection of denial‐of‐service attack in wireless sensor networks |