2023
DOI: 10.1016/j.iot.2023.100741
|View full text |Cite
|
Sign up to set email alerts
|

A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1
1

Relationship

3
6

Authors

Journals

citations
Cited by 33 publications
(12 citation statements)
references
References 74 publications
0
12
0
Order By: Relevance
“…The attacks that can occur on RPL version numbers are mentioned in [10][11][12]. A probabilistic attacking model measures the potential impact, which analyzes power consumption, packet delivery ratio, delay, and control packet overhead.…”
Section: Lecture Survey and Contributionmentioning
confidence: 99%
“…The attacks that can occur on RPL version numbers are mentioned in [10][11][12]. A probabilistic attacking model measures the potential impact, which analyzes power consumption, packet delivery ratio, delay, and control packet overhead.…”
Section: Lecture Survey and Contributionmentioning
confidence: 99%
“…Moreover, the rigidity of the conventional network decreases elasticity and increases operational expenses. As a result, those challenges impede the momentum of emerging technologies, including cloud computing, IoT technologies, and big data, which progressively demand more bandwidth, flexibility, and manageability [1,2]. Under those circumstances, SDN [3] emerged and was touted as an innovative networking model capable of handling and addressing the growing demands of next-generation networks and emerging technologies.…”
Section: Introductionmentioning
confidence: 99%
“…IoT networks are more vulnerable to attacks because of the wide variety of connected devices, each of which may have different processing speeds, storage capacities, and security mechanisms. These gadgets’ wireless communication methods are also susceptible to interference and eavesdropping, which might compromise sensitive information and personal privacy [ 4 ]. Furthermore, IoT-specific attacks, such as Mirai [ 5 ] and Hajime [ 6 ], pose significant risks, including damage to reputation and consumer trust.…”
Section: Introductionmentioning
confidence: 99%
“…However, regularly updating IoT devices with security patches, implementing data encryption, and maintaining backups are vital practices to ensure ongoing security. By adopting these measures, we can enhance the resilience of IoT networks and safeguard the integrity and privacy of user data [ 4 , 7 ].…”
Section: Introductionmentioning
confidence: 99%