[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Pishdar et al., 2022 - Google Patents

PCC-RPL: an efficient trust-based security extension for RPL

Pishdar et al., 2022

Document ID
2894100226023834270
Author
Pishdar M
Seifi Y
Nasiri M
Bag-Mohammadi M
Publication year
Publication venue
Information Security Journal: A Global Perspective

External Links

Snippet

ABSTRACT RPL is a de facto routing protocol for IoT (Internet of Things). In this paper, an efficient IDS (intrusion detection system) is proposed to solve a major security vulnerability of RPL, which is called fabricated parent change. We show that many well-known attacks and …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/22Tracking the activity of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity

Similar Documents

Publication Publication Date Title
Hajiheidari et al. Intrusion detection systems in the Internet of things: A comprehensive investigation
Selvi et al. An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks
Meng et al. A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks
Loo et al. Intrusion detection for routing attacks in sensor networks
Rehman et al. Sinkhole attacks in wireless sensor networks: A survey
Bang et al. Assessment of routing attacks and mitigation techniques with RPL control messages: A survey
Ghahramani et al. RSS: An energy-efficient approach for securing IoT service protocols against the DoS attack
Al-Amiedy et al. A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things
Smith et al. Battery draining attacks against edge computing nodes in IoT networks
Pishdar et al. PCC-RPL: an efficient trust-based security extension for RPL
Subburayalu et al. Cluster based malicious node detection system for mobile ad-hoc network using ANFIS classifier
Patel et al. A reputation‐based RPL protocol to detect selective forwarding attack in Internet of Things
Muzammal et al. Trust and mobility-based protocol for secure routing in Internet of Things
Rabhi et al. IoT routing attacks detection using machine learning algorithms
Li et al. A study on one‐dimensional k‐coverage problem in wireless sensor networks
Kaur et al. Secure trust based key management routing framework for wireless sensor networks
Vamsi et al. Trust and location-aware routing protocol for wireless sensor networks
Srinivas et al. Black hole and selective forwarding attack detection and prevention in IoT in health care sector: Hybrid meta-heuristic-based shortest path routing
Bang et al. Impact analysis of rank attack on RPL-based 6LoWPAN networks in Internet of Things and aftermaths
Anitha et al. VeNADet: version number attack detection for RPL based Internet of Things
Gothawal et al. An intelligent and lightweight intrusion detection mechanism for RPL routing attacks by applying automata model
Nandhini et al. Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers
Albinali et al. Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach
Shashwat et al. A modified AODV protocol for preventing blackhole attack in MANETs
Remya et al. Enhancing Security in LLNs using a Hybrid Trust-Based Intrusion Detection System for RPL