2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT) 2020
DOI: 10.1109/3ict51146.2020.9311983
|View full text |Cite
|
Sign up to set email alerts
|

RPL rank attack detection using Deep Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(17 citation statements)
references
References 11 publications
0
17
0
Order By: Relevance
“…In addition, other studies, such as [7,8,21,45,50,51,53,59,60,62], did not mention the number of features used or selected in their approach. Moreover, two studies [57,60] did not disclose the type of program used in the implementation step, and did not provide information about the dataset and the feature selection technique used.…”
Section: Ac Precision Recall Specificitymentioning
confidence: 99%
See 3 more Smart Citations
“…In addition, other studies, such as [7,8,21,45,50,51,53,59,60,62], did not mention the number of features used or selected in their approach. Moreover, two studies [57,60] did not disclose the type of program used in the implementation step, and did not provide information about the dataset and the feature selection technique used.…”
Section: Ac Precision Recall Specificitymentioning
confidence: 99%
“…A DL approach for detecting Rank attack in RPL was introduced by [62]. The proposed approach employs MLP for verifying and classifying the normal and suspicious behavior of network traffic.…”
Section: Rq3: What Are the Prevailing DL Approaches Contributed By Ex...mentioning
confidence: 99%
See 2 more Smart Citations
“…Rank increase attacks: these attacks include purposefully raising an RPL node's rank value to construct a network loop. A rank value in an RPL network is determined by each node and corresponds to the root node's location in the graph structure [101,102]. The nodes' rank in the downward paths will be continuously increasing to stabilize the DODAG graph structure.…”
Section: Rpl Protocol-specific Attacksmentioning
confidence: 99%