2019
DOI: 10.1007/978-3-030-37484-6_11
|View full text |Cite
|
Sign up to set email alerts
|

Energy Efficient Approach to Detect Sinkhole Attack Using Roving IDS in 6LoWPAN Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 25 publications
0
12
0
Order By: Relevance
“…However, these studies have been limited in contribution because of the datasets used. Some of them (Al-Hadhrami & Hussain, 2020;Bhale, Dey, Biswas & Nandi, 2020;Cakir, Toklu & Yalcin, 2020;Cakir & Yalcin, 2021;Mbarek, Ge & Pitner, 2020;Sharma, Elmiligi, Gebali & Verma, 2019;Verma & Ranga, 2020;Yavuz, Ünal & Gül, 2018) use simulation data for developing their models but such data may not be very convenient to develop machine learning models especially in realistic attack scenarios because simulators simulate a certain behavior and the data generated by them may not be very realistic. Some other works (Mounica, Vijayasaraswathi & Vasavi, 2021;Rezvy, Luo, Petridis, Lasebae & Zebin, 2019), on the other hand, use outdated network datasets which consist of generic network attacks.…”
Section: Motivationmentioning
confidence: 99%
“…However, these studies have been limited in contribution because of the datasets used. Some of them (Al-Hadhrami & Hussain, 2020;Bhale, Dey, Biswas & Nandi, 2020;Cakir, Toklu & Yalcin, 2020;Cakir & Yalcin, 2021;Mbarek, Ge & Pitner, 2020;Sharma, Elmiligi, Gebali & Verma, 2019;Verma & Ranga, 2020;Yavuz, Ünal & Gül, 2018) use simulation data for developing their models but such data may not be very convenient to develop machine learning models especially in realistic attack scenarios because simulators simulate a certain behavior and the data generated by them may not be very realistic. Some other works (Mounica, Vijayasaraswathi & Vasavi, 2021;Rezvy, Luo, Petridis, Lasebae & Zebin, 2019), on the other hand, use outdated network datasets which consist of generic network attacks.…”
Section: Motivationmentioning
confidence: 99%
“…Every CH's datum is instantly forwarded to the BS [26]. Various surveys on energy use, energy gaps and attacks on RPL and LLP systems can be found in [27][28][29][30]. The glowworm swarm-based approach cast-off energy-based transmission strategy has been presented to decrease energy consumption caused by control overhead [31].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The dependence on permission is one of the benefits of this approach that creates various rules for every network area. Lee et al [56] take a regional network organization approach. By creating a column of observer nodes, they use a combination technique.…”
Section: Placement Technique For Hybrid Intrusion Detectionmentioning
confidence: 99%