2020
DOI: 10.1002/dac.4693
|View full text |Cite
|
Sign up to set email alerts
|

A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem

Abstract: Summary Internet of Things (IoT) provides the possibility for milliards of devices throughout the world to communicate with each other, and data are collected autonomously. The big data generated by the devices should be managed securely. Due to security challenges, like malicious nodes, many approaches cannot respond to these concerns. In this paper, a robust hybrid method, including encryption, is used as an efficient approach for resolving the Low‐Power and Lossy Networks (RPL) protocol concerns so that the… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 41 publications
(31 citation statements)
references
References 28 publications
0
31
0
Order By: Relevance
“…Zaminkar et al 39 proposed an effective hybrid method, which includes encryption, as an efficient approach for resolving the RPL protocol concerns, ensuring that the devices are securely connected. Giannakoulias 40 addressed regulatory ramifications, compliance with laws and requirements, new attack vectors arising from virtualization technology flaws, problems of data privacy such as encryption and access permissions, and security tests to be carried out on networks before their move to the cloud.…”
Section: Literature Surveymentioning
confidence: 99%
“…Zaminkar et al 39 proposed an effective hybrid method, which includes encryption, as an efficient approach for resolving the RPL protocol concerns, ensuring that the devices are securely connected. Giannakoulias 40 addressed regulatory ramifications, compliance with laws and requirements, new attack vectors arising from virtualization technology flaws, problems of data privacy such as encryption and access permissions, and security tests to be carried out on networks before their move to the cloud.…”
Section: Literature Surveymentioning
confidence: 99%
“…The article mainly focuses on attacks against the RPL protocol and mitigation methods based on trust models. Zaminkar et al 24 presented a method of detecting a sinkhole attack in the RPL protocol, called (DSH‐RPL). The idea of the solution is to detect malicious nodes and prevent malicious behavior using homomorphic encryption.…”
Section: Related Workmentioning
confidence: 99%
“…IoT intrusion prevention systems such as authentication and encryption can be used as the first line of defense against attacks. 9 These prevention schemes cannot eliminate internal attacks like a black hole, selective forwarding, rank, and wormhole. Since IoT nodes are not physically protected, they are captured and compromised by adversaries.…”
Section: Motivationmentioning
confidence: 99%