2020
DOI: 10.1109/jiot.2020.2971463
|View full text |Cite
|
Sign up to set email alerts
|

Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
29
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4
2

Relationship

2
8

Authors

Journals

citations
Cited by 82 publications
(29 citation statements)
references
References 37 publications
0
29
0
Order By: Relevance
“…Though GRU based deep learning model shows higher performance, it can detect only one attack. Pu [30] designed a Gini Index-based countermeasure (GINI) to protect the RPL based networks from Sybil attack. The performance of proposed GINI countermeasure is compared with two existing algorithms like two-step detection and SecRPL.…”
Section: Ids In Rpl Based Iotmentioning
confidence: 99%
“…Though GRU based deep learning model shows higher performance, it can detect only one attack. Pu [30] designed a Gini Index-based countermeasure (GINI) to protect the RPL based networks from Sybil attack. The performance of proposed GINI countermeasure is compared with two existing algorithms like two-step detection and SecRPL.…”
Section: Ids In Rpl Based Iotmentioning
confidence: 99%
“…Over the last decade, the number of devices connected to the Internet has been rapidly increasing due to the proliferation of emerging technologies such as Internet of ings, artificial intelligence, and blockchain [1]. According to Cisco Annual Internet Report [2], there will be 29.3 billion networked devices by 2023.…”
Section: Introductionmentioning
confidence: 99%
“…In this study, IoT attacks has been carried out by exploiting the vulnerabilities of IoT devices. Subsequently, the network forensic packages of Flood Attack, which is one of the most important one on RPL-based attacks [6,7,8], has been analyzed by examining the effects of attacks on the system. WSNs have emerged as an important application of the paradigm of Ad-Hoc Networks such as physical environment monitoring.…”
Section: Introductionmentioning
confidence: 99%