2020
DOI: 10.1007/s11277-020-07421-z
|View full text |Cite
|
Sign up to set email alerts
|

SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism

Abstract: Through the Internet of Things (IoT) the internet scope is established by the integration of physical things to classify themselves into mutual things. A physical thing can be created by this inventive perception to signify itself in the digital world. Regarding the physical things that are related to the internet, it is worth noting that considering numerous theories and upcoming predictions, they mostly require protected structures, moreover, they are at risk of several attacks. IoTs are endowed with particu… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
40
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
5

Relationship

2
8

Authors

Journals

citations
Cited by 73 publications
(56 citation statements)
references
References 34 publications
0
40
0
Order By: Relevance
“…The difficulties in implementation and debugging routing protocols in real networks, raises the necessity to consider simulations as a fundamental design tool. The main advantage of simulation is simplifying analysis and protocol verification, mainly in large-scale systems [20][21][22][23][24][25][26][27][28][29][30][31][32][33]. It is possible to employ a NAM in the NS-2 to visualize the results.…”
Section: B Simulation Setup and Comparing Algorithmsmentioning
confidence: 99%
“…The difficulties in implementation and debugging routing protocols in real networks, raises the necessity to consider simulations as a fundamental design tool. The main advantage of simulation is simplifying analysis and protocol verification, mainly in large-scale systems [20][21][22][23][24][25][26][27][28][29][30][31][32][33]. It is possible to employ a NAM in the NS-2 to visualize the results.…”
Section: B Simulation Setup and Comparing Algorithmsmentioning
confidence: 99%
“…In [18], SCOTRES-a trust-oriented system is proposed for secure routing in ad-hoc networks to advance the network entities' intelligence using 5 innovative metrics. The resource consumption of each node is considered by the energy metric to impose similar quantity of collaboration and to increase the network's lifetime.…”
Section: Grayhole Attackmentioning
confidence: 99%
“…Packet loss is measured as a percentage of packets lost with respect to packets sent. The lower value of the packet loss means the better performance of the protocol [30][31][32][33][34][35][36][37]. The PLR is calculated in Equation 17follows:…”
Section: Average Throughputmentioning
confidence: 99%