Publisher
Springer Nature Switzerland
Reference39 articles.
1. R. Sahay, G. Geethakumari, B. Mitra, IB-RPL: embedding isolation and blacklisting of malicious nodes in RPL for securing IoT-LLNs, in 2021 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (2021), pp. 1–6
2. F.-t. Zahra, N.Z. Jhanjhi, S.N. Brohi, N.A. Malik, Proposing a rank and wormhole attack detection framework using machine learning, in 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS) (2019). Art. no. 9024821
3. R. Sahay, G. Geethakumari, B. Mitra, A holistic framework for prediction of routing attacks in IoT-LLNs. J. Supercomput. 78(1), 1409–1433 (2022)
4. F. Semedo, N. Moradpoor, M. Rafiq, Vulnerability assessment of objective function of RPL protocol for Internet of Things, in Proceedings of the 11th International Conference on Security of Information and Networks (2018), pp. 1–6
5. W. Yang, Y. Wang, Z. Lai, Y. Wan, Z. Cheng, Security vulnerabilities and countermeasures in the RPL-based Internet of Things, in 2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 49–495 (IEEE, 2018)