[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Bang et al., 2023 - Google Patents

Impact analysis of rank attack on RPL-based 6LoWPAN networks in Internet of Things and aftermaths

Bang et al., 2023

Document ID
9999880689267160621
Author
Bang A
Rao U
Publication year
Publication venue
Arabian Journal for Science and Engineering

External Links

Snippet

Routing protocol for low power and lossy networks (RPL) serves the routing process in Internet Protocol version 6 over low-power wireless personal area network protocol stack. RPL protocol is deployed on sensor nodes and is vulnerable to many attacks due to the …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks

Similar Documents

Publication Publication Date Title
Verma et al. Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review
Pasikhani et al. Intrusion detection systems in RPL-based 6LoWPAN: A systematic literature review
Le et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach
Şen et al. Intrusion detection in mobile ad hoc networks
Meng et al. A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks
Latif et al. Distributed denial of service (DDoS) attack in cloud-assisted wireless body area networks: a systematic literature review
Bang et al. Impact analysis of rank attack on RPL-based 6LoWPAN networks in Internet of Things and aftermaths
Smith et al. Battery draining attacks against edge computing nodes in IoT networks
Bang et al. EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things
Ioulianou et al. Denial-of-service attacks and countermeasures in the RPL-based Internet of Things
Bang et al. A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case
Sharma et al. Performance evaluation of mobile RPL-based IoT networks under version number attack
Khan et al. A secure and dependable trust assessment (SDTS) scheme for industrial communication networks
Anand et al. Trust based DoS attack detection in wireless sensor networks for reliable data transmission
Liang et al. A dynamic source routing protocol based on path reliability and link monitoring repair
Su et al. A hybrid entropy and blockchain approach for network security defense in SDN-based IIoT
Azzedin Mitigating denial of service attacks in RPL-based IoT environments: trust-based approach
Nazaralipoorsoomali et al. Performance improvement of routing protocol for low‐power and lossy networks protocol in an internet of things‐based smart retail system
Sahay et al. A holistic framework for prediction of routing attacks in IoT-LLNs
Nandhini et al. Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers
Dhulipala et al. Trust management technique in wireless sensor networks: challenges and issues for reliable communication: a review
Alyami et al. Fragmentation attacks and countermeasures on 6LoWPAN internet of things networks: Survey and simulation
Albinali et al. Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach
Nandhini et al. Directed acyclic graph inherited attacks and mitigation methods in RPL: a review
Abidoye et al. Lightweight models for detection of denial‐of‐service attack in wireless sensor networks