The rapid expansion of Internet of Things (IoT) devices has heightened the demand for lightweight and secure cryptographic mechanisms suitable for resource-constrained environments.
Iain Baird +4 more
doaj +1 more source
An evaluation of link estimation algorithms for RPL in dynamic wireless sensor networks [PDF]
Carels, David +4 more
core +2 more sources
RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things. [PDF]
Alansari Z +3 more
europepmc +1 more source
DLIIoT: A Deep Learning based Intelligent Attack Detection in IoT Networks using Cooja Simulator
Internet of things (IoT) has incredibly transformed the whole domain of communication process. The extensive dependency on these devices leads to various advanced cyber security threats. IoT devices fall easily into the ambit of malicious threats and are susceptible to vast range of attacks due to their limited computation capabilities and memory ...
H. Sharma, J. Manhas, V. Sharma
openaire +1 more source
The literature on IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) makes it abundantly evident that there is a trade-off between convergence time and power usage.
Soumya Vastrad, Shobha K. R.
doaj +1 more source
Fragmentation Attacks and Countermeasures on 6LoWPAN Internet of Things Networks: Survey and Simulation. [PDF]
Alyami S, Alharbi R, Azzedin F.
europepmc +1 more source
Günümüzde pek çok alanda kullanılan düşük kaynağa sahip sensör düğümler, nesnelerin internetinin çok önemli bir parçasıdır. Özellikle kablosuz sensör ağların sanayi, tıp gibi birçok sektörde kullanılması, akıllı üretim tesislerinin kurulması, hastaların uzaktan izlenmesi gibi birçok önemli gelişmeye neden oldu. Bu cihazları fiziksel ortamda test etmek,
Karataş, İbrahim, Bayraklı, Selim
openaire +1 more source
Trust and Mobility-Based Protocol for Secure Routing in Internet of Things. [PDF]
Muzammal SM +4 more
europepmc +1 more source
Towards Scalable and Efficient Architecture for Modeling Trust in IoT Environments. [PDF]
Ghaleb M, Azzedin F.
europepmc +1 more source
Securing Smart Healthcare Cyber-Physical Systems against Blackhole and Greyhole Attacks Using a Blockchain-Enabled Gini Index Framework. [PDF]
Javed M +5 more
europepmc +1 more source

