2020 International Conference on Computational Intelligence (ICCI) 2020
DOI: 10.1109/icci51257.2020.9247818
|View full text |Cite
|
Sign up to set email alerts
|

SMTrust: Proposing Trust-Based Secure Routing Protocol for RPL Attacks for IoT Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…All these crucial considerations demonstrate the importance of enhancing the resilience of RPL networks against internal routing attacks, particularly the VN attack. Recently, there have been some research efforts toward addressing such a fundamental RPL security challenge of VN attack mitigation [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35]. However, most of the proposed solutions were based on limited design aspects such as the need for additional entities, heavy node-local processing, and further communication establishment.…”
Section: Trillion Amentioning
confidence: 99%
See 2 more Smart Citations
“…All these crucial considerations demonstrate the importance of enhancing the resilience of RPL networks against internal routing attacks, particularly the VN attack. Recently, there have been some research efforts toward addressing such a fundamental RPL security challenge of VN attack mitigation [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35]. However, most of the proposed solutions were based on limited design aspects such as the need for additional entities, heavy node-local processing, and further communication establishment.…”
Section: Trillion Amentioning
confidence: 99%
“…The simulation results indicated the ability of the proposed approach to achieve high QoS performance and an acceptable accuracy rate. A different trust-based solution was also proposed in [25] to address VN attacks in addition to other routing attacks in RPL networks. It is based on the calculation of node trustworthiness using essential trust metrics.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Further, the author used deep learning-based for vulnerability discovery and deep learning is suitable to deal with problems. As the author took some guiding principles to apply deep learning to vulnerability discovery and find representations of software programs that are suitable for deep learning [25]. The researcher used code gadgets to symbolize platforms and transformed them into paths.…”
Section: Bsummary Of Other Associated Research Papersmentioning
confidence: 99%
“…In (13) proposed an algorithm to secure the RPL protocol with trust parameters and mobility parameters that allows only the trusted nodes to take part in data transmission. This algorithm failed to identify the behavior of the malicious node and also to identify the rank attacks.…”
Section: Introductionmentioning
confidence: 99%