2023
DOI: 10.1109/access.2022.3221434
|View full text |Cite
|
Sign up to set email alerts
|

Security Challenges of Selective Forwarding Attack and Design a Secure ECDH-Based Authentication Protocol to Improve RPL Security

Abstract: Today, we could describe the Internet of Things (loT) as the pervasive and global network that provides a system for monitoring, controlling, processing, and analyzing the data generated by IoT devices. The huge amount of data generated by IoT devices when transported and routed through the internet presents several challenges. One of the common routing protocols in IoT networks is RPL (Routing Protocol for Low Power and Lossy Networks), but it is prone to security issues and attacks. Due to the presence of se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 65 publications
0
2
0
Order By: Relevance
“…Once, there was a safer method to store cryptocurrencies considered by researchers. In that method, the MITM attack [44] exposed the vulnerability of ledger hardware wallets. This attack permits a cybercriminal to create a duplicate or clone address of the cryptocurrency by showing it to the customer and utilizing the original address to deliver it to the wallet.…”
Section: Man-in-the-middle Attack [42]mentioning
confidence: 99%
“…Once, there was a safer method to store cryptocurrencies considered by researchers. In that method, the MITM attack [44] exposed the vulnerability of ledger hardware wallets. This attack permits a cybercriminal to create a duplicate or clone address of the cryptocurrency by showing it to the customer and utilizing the original address to deliver it to the wallet.…”
Section: Man-in-the-middle Attack [42]mentioning
confidence: 99%
“…Routing algorithms that are often used in IoT networks are:  Routing protocol for low-power and lossy networks (RPL), commonly known as RPL, is a distance-vector routing system made for networks with low power and poor connectivity. It is made to work with devices that have limited memory, processing power, and power backup [8].  Dynamic source routing (DSR) is another reactive routing system that only finds a route between two nodes when it is needed.…”
Section: *Author For Correspondencementioning
confidence: 99%
“…VANETs use Certificate Authorities (CAs) to authenticate automobiles and roadside equipment. Building trust in VANETs is very important because it is what makes safety-critical applications like avoiding collisions, managing traffic flow, and planning routes dynamically possible [74], [34], [8] work. However, relying on centralized CAs has significant concerns.…”
Section: Introductionmentioning
confidence: 99%