Pishdar et al., 2022 - Google Patents
PCC-RPL: an efficient trust-based security extension for RPLPishdar et al., 2022
- Document ID
- 2894100226023834270
- Author
- Pishdar M
- Seifi Y
- Nasiri M
- Bag-Mohammadi M
- Publication year
- Publication venue
- Information Security Journal: A Global Perspective
External Links
Snippet
ABSTRACT RPL is a de facto routing protocol for IoT (Internet of Things). In this paper, an efficient IDS (intrusion detection system) is proposed to solve a major security vulnerability of RPL, which is called fabricated parent change. We show that many well-known attacks and …
- 238000001514 detection method 0 abstract description 25
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/22—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hajiheidari et al. | Intrusion detection systems in the Internet of things: A comprehensive investigation | |
Selvi et al. | An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks | |
Meng et al. | A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks | |
Loo et al. | Intrusion detection for routing attacks in sensor networks | |
Rehman et al. | Sinkhole attacks in wireless sensor networks: A survey | |
Bang et al. | Assessment of routing attacks and mitigation techniques with RPL control messages: A survey | |
Ghahramani et al. | RSS: An energy-efficient approach for securing IoT service protocols against the DoS attack | |
Al-Amiedy et al. | A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things | |
Smith et al. | Battery draining attacks against edge computing nodes in IoT networks | |
Pishdar et al. | PCC-RPL: an efficient trust-based security extension for RPL | |
Subburayalu et al. | Cluster based malicious node detection system for mobile ad-hoc network using ANFIS classifier | |
Patel et al. | A reputation‐based RPL protocol to detect selective forwarding attack in Internet of Things | |
Muzammal et al. | Trust and mobility-based protocol for secure routing in Internet of Things | |
Rabhi et al. | IoT routing attacks detection using machine learning algorithms | |
Li et al. | A study on one‐dimensional k‐coverage problem in wireless sensor networks | |
Kaur et al. | Secure trust based key management routing framework for wireless sensor networks | |
Vamsi et al. | Trust and location-aware routing protocol for wireless sensor networks | |
Srinivas et al. | Black hole and selective forwarding attack detection and prevention in IoT in health care sector: Hybrid meta-heuristic-based shortest path routing | |
Bang et al. | Impact analysis of rank attack on RPL-based 6LoWPAN networks in Internet of Things and aftermaths | |
Anitha et al. | VeNADet: version number attack detection for RPL based Internet of Things | |
Gothawal et al. | An intelligent and lightweight intrusion detection mechanism for RPL routing attacks by applying automata model | |
Nandhini et al. | Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers | |
Albinali et al. | Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach | |
Shashwat et al. | A modified AODV protocol for preventing blackhole attack in MANETs | |
Remya et al. | Enhancing Security in LLNs using a Hybrid Trust-Based Intrusion Detection System for RPL |