2021
DOI: 10.1080/19393555.2021.1887413
|View full text |Cite
|
Sign up to set email alerts
|

PCC-RPL: An efficient trust-based security extension for RPL

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Any malicious activity detected by a parent reduces the trust level associated with the child and alerts the root node by transmitting a suspicious message. The article [16] addresses the security of IoT networks by exploiting vulnerabilities in the message queuing telemetry transport (MQTT) protocol. To discover new security vulnerabilities in MQTT, a fuzzy attack approach was proposed to detect security breaches.…”
Section: Vulnerability Analysis In Rpl-based Approachesmentioning
confidence: 99%
“…Any malicious activity detected by a parent reduces the trust level associated with the child and alerts the root node by transmitting a suspicious message. The article [16] addresses the security of IoT networks by exploiting vulnerabilities in the message queuing telemetry transport (MQTT) protocol. To discover new security vulnerabilities in MQTT, a fuzzy attack approach was proposed to detect security breaches.…”
Section: Vulnerability Analysis In Rpl-based Approachesmentioning
confidence: 99%
“…For most IoT deployments, some measure of security is required based on factors such as the type of application, the location of deployment, and the significance of the data being provided [95]- [97]. IoT apps benefit from having trust, authenticity, authentication, availability, privacy, and integrity.…”
Section: Securitymentioning
confidence: 99%
“…In one study, a new approach called the PCC-RPL (Parental Change Control RPL) was introduced to manage changes made by parents to IoT devices using the trust concept. This model's calculations are carried out at the node level of the topology [15]. In another study, a model was developed for enhancing RPL security and mitigating vulnerabilities to WSN-inherited and RPL-specific attacks.…”
Section: Related Workmentioning
confidence: 99%