2021
DOI: 10.1109/jsen.2021.3068240
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection Systems in RPL-Based 6LoWPAN: A Systematic Literature Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 35 publications
(49 citation statements)
references
References 100 publications
0
49
0
Order By: Relevance
“…This attack is brutal to detect, owing to its static nature. When an unknown intruder is involved, the best way to avoid interception is to encrypt communications [124,125].…”
Section: Rpl Protocol-specific Attacksmentioning
confidence: 99%
“…This attack is brutal to detect, owing to its static nature. When an unknown intruder is involved, the best way to avoid interception is to encrypt communications [124,125].…”
Section: Rpl Protocol-specific Attacksmentioning
confidence: 99%
“…Below we identify various desirable important characteristics that could be expected of a high performing IDS in our target domain. These are based on our own views and those of other researchers ( [1], [19], [20]). DF1: Adaptivity.…”
Section: A Desirable Characteristicsmentioning
confidence: 99%
“…[18] to enable routing among nodes in low power and lossy networks. RPL is intended to work in LLNs with a low data rate (∼250 kbps) [1], low throughput and high packet loss rate. Moreover, there is an assumption that links would be lossy and occasionally unreachable for an extended period; therefore, when the preferred path is inaccessible RPL is required to provide an alternative route.…”
Section: Df4mentioning
confidence: 99%
See 2 more Smart Citations