2019
DOI: 10.1049/iet-cds.2018.5079
|View full text |Cite
|
Sign up to set email alerts
|

DDoS attack aware environment with secure clustering and routing based on RPL protocol operation

Abstract: Routeing protocol for low-power and lossy networks (RPL) are widely used in dynamic wireless sensor network. Several types of researches worked on RPL and designed hybrid energy-efficient cluster-parent-based RPL, queue utilisation (QU)-RPL, improved RPL, attack detection RPL etc. to support from vulnerable threats, provide efficient routeing and balance dynamic nodes in the network. Previous research findings dealt with certain limitations and problems. In this study, a new coordinative-balanced clustering al… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 32 publications
(40 reference statements)
0
3
0
Order By: Relevance
“…There are many researches on secure and trusted routing in Wireless Sensor Network (WSN). Alabsi et al proposed a DDoS detection method based on Ant Colony Optimization (ACO) algorithm for WSN to find the routing nodes under attack by analyzing packet characteristics such as IP, protocol types, destination address [20]. The nodes suffering from DDoS attacks will be avoided for trusted routing.…”
Section: B Trusted Routing Methodsmentioning
confidence: 99%
“…There are many researches on secure and trusted routing in Wireless Sensor Network (WSN). Alabsi et al proposed a DDoS detection method based on Ant Colony Optimization (ACO) algorithm for WSN to find the routing nodes under attack by analyzing packet characteristics such as IP, protocol types, destination address [20]. The nodes suffering from DDoS attacks will be avoided for trusted routing.…”
Section: B Trusted Routing Methodsmentioning
confidence: 99%
“…The sensed data is forwarded toward the root, i.e., the IoT gateway, in this proposed work. In general, RPL uses four significant control messages for constructing DODAG[21]. The control messages are described as follows, DODAG Information Object (DIO): The root nodes presented in the network initiate this message to construct the DODAG.…”
mentioning
confidence: 99%
“…• DDoS Flooding Attack: In a DDoS flooding attack, various malicious nodes target the network nodes with vast amounts of traffic to interrupt the normal operation of the network services. This attack also increases communication overhead and overwhelms the power resources of the sensor nodes[63,76,77]. This attack happens when the malicious node dislocates the network routing path by selectively forwarding some of the packets in the network while leaving the rest forwarded to the original destination[21].…”
mentioning
confidence: 99%