2018
DOI: 10.1007/s11277-017-5165-4
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(26 citation statements)
references
References 39 publications
0
26
0
Order By: Relevance
“…In Nikravan et al, 3 a method has been presented for detecting the malicious nodes in IoT. This hybrid intrusion detection model is used to detect the malicious operations of “selective forwarding” and “sinkhole attack” based on the 6LOWPAN protocol.…”
Section: Sinkhole Attacks and Detection Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…In Nikravan et al, 3 a method has been presented for detecting the malicious nodes in IoT. This hybrid intrusion detection model is used to detect the malicious operations of “selective forwarding” and “sinkhole attack” based on the 6LOWPAN protocol.…”
Section: Sinkhole Attacks and Detection Approachesmentioning
confidence: 99%
“…The proposed DSH‐RPL method has been simulated, and its performance evaluated in Network Simulator version 2 (NS‐2) running on Linux Ubuntu 14.03 LTS. The results were compared with both methods (SecTrust‐RPL 1 and IBOOS‐RPL 3 ).…”
Section: Performance Evaluationmentioning
confidence: 99%
“…To mitigate the effects of the version number attacks, the researchers in [ 29 ] proposed and designed a lightweight approach. Every node in the RPL network executes independent algorithms, in which the state of the nodes is not stored.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To mitigate the effect of the version number attack, the researchers in [29] proposed and designed a lightweight approach. Every node in the RPL network executes independent algorithms, in which the state of the nodes are not stored.…”
Section: Classification Based Rpl Version Number Attack Modification mentioning
confidence: 99%