2021
DOI: 10.3390/s21093173
|View full text |Cite
|
Sign up to set email alerts
|

A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT

Abstract: At present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security information standards, particularly those regarding security in depth, several defensive layers are required to protect information assets. Within the context of IoT cyber-attacks, it is fundamental to continuously adapt new detection mechanisms for growing IoT threat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 61 publications
(66 reference statements)
0
9
0
Order By: Relevance
“…Figure 5b shows that most related studies were published in IEEE Xplore ® digital library (14), followed by Google Scholar (13) and Springer Link (12), while Scopus and Science Direct returned the same number of published studies (5). Furthermore, it is worth mentioning that there are many studies published by other publishers, such as MDPI and Wiley, but rather than directly extracting them from the publishers' databases, we obtained those studies via the Google Scholar database.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Figure 5b shows that most related studies were published in IEEE Xplore ® digital library (14), followed by Google Scholar (13) and Springer Link (12), while Scopus and Science Direct returned the same number of published studies (5). Furthermore, it is worth mentioning that there are many studies published by other publishers, such as MDPI and Wiley, but rather than directly extracting them from the publishers' databases, we obtained those studies via the Google Scholar database.…”
Section: Resultsmentioning
confidence: 99%
“…Molina et al [5] introduced a DNN approach for detecting CID attacks in RPL networks. They used the Cooja simulator to implement CID attacks and three types of topological structures with a different number of normal and malicious nodes to build a dataset.…”
Section: Rq3: What Are the Prevailing DL Approaches Contributed By Ex...mentioning
confidence: 99%
See 1 more Smart Citation
“…The authors in [83] discussed the inability of conventional techniques to handle the novel attacks like clone ID in RPL network for IoT devices. A framework based on AI is proposed to cater to such kind of attacks.…”
Section: ) Ai Based Frameworkmentioning
confidence: 99%
“…Morales-Molina et al propose an approach for IoT cyber-attack detection and protection framework driven by artificial intelligence methods [28]. Unsupervised techniques are utilized for the selection of the main characteristics of low power and Lossy Network and Dense Neural Network algorithm for precisely deciding a classification task.…”
mentioning
confidence: 99%