References
- X. Mu and M. F. Antwi-Afari, “The applications of Internet of Things (IoT) in industrial management: a science mapping review,” International Journal of Production Research, vol. 62, no. 5, pp. 1928–1952, Dec. 2023, doi: 10.1080/00207543.2023.2290229.
- R. Chataut, A. Phoummalayvane, and R. Akl, “Unleashing the Power of IoT: A Comprehensive Review of IoT Applications and Future Prospects in Healthcare, Agriculture, Smart Homes, Smart Cities, and Industry 4.0,” Sensors, vol. 23, no. 16, p. 7194, Aug. 2023, doi: 10.3390/s23167194.
- M. Albreem, A.M. Sheikh and A.E. Ayman, “Towards a Sustainable Environment with a Green IoT: An Overview,”. 2022 International Conference on Computer Technologies (ICCTech), 2017, doi: 10.1109/ICCTech55650.2022.00017.
- P. Gkonis, A. Giannopoulos, P. Trakadas, X. Masip-Bruin, and F. D’Andria, “A Survey on IoT-Edge-Cloud Continuum Systems: Status, Challenges, Use Cases, and Open Issues,” Future Internet, vol. 15, no. 12, p. 383, Nov. 2023, doi: 10.3390/fi15120383.
- S. Syaifuddin, S. S. Kusumawardani, and W. Widyawan, “Tackling DDOS Attacks in IoT: Asynthesis of Literature 2018 to 2022”, Int J Intell Syst Appl Eng, vol. 12, no. 1, pp. 802–809, Dec. 2023
- A. Heidari and M. A. Jabraeil Jamali, “Internet of Things intrusion detection systems: a comprehensive review and future directions,” Cluster Computing, vol. 26, no. 6, pp. 3753–3780, Oct. 2022, doi: 10.1007/s10586-022-03776-z.
- N. A. Alfriehat, M. Anbar, S. Karuppayah, S. D. A. Rihan, B. A. Alabsi, and A. M. Momani, “Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy,” IEEE Access, vol. 12, pp. 31136–31158, 2024, doi: 10.1109/access.2024.3368633.
- H. Almutairi and N. Zhang, “A Survey on Routing Solutions for Low-Power and Lossy Networks: Toward a Reliable PathFinding Approach,” Network, vol. 4, no. 1, pp. 1–32, Jan. 2024, doi: 10.3390/network4010001.
- A. El Hajjar, “Key-Pre Distribution for the Internet of Things Challenges, Threats and Recommendations,” Wireless Networks, pp. 1–42, 2023, doi: 10.1007/978-3-031-33631-7_1.
- I. S. Alsukayti and M. Alreshoodi, “Toward an understanding of recent developments in RPL routing,” IET Networks, vol. 8, no. 6, pp. 356–366, Nov. 2019, doi: 10.1049/iet-net.2018.5167.
- M. Rouissat, M. Belkheir, H. S. A. Belkhira, S. Boukli Hacene, P. Lorenz, and M. Bouziani, “A new lightweight decentralized mitigation solution against Version Number Attacks for IoT Networks,” JUCS - Journal of Universal Computer Science, vol. 29, no. 2, pp. 118–151, Feb. 2023, doi: 10.3897/jucs.85506.
- P. Levis, T. Clausen, J. Hui, O. Gnawali, and J. Ko, “The Trickle Algorithm,” Mar. 2011, doi: 10.17487/rfc6206.
- A. Hkiri, M. Karmani, O. B. Bahri, A. M. Murayr, F. H. Alasmari, and M. Machhout, “RPL-Based IoT Networks under Decreased Rank Attack: Performance Analysis in Static and Mobile Environments,” Computers, materials and continua (Print), Jan. 01, 2023. doi : 10.32604/cmc.2023.047087.
- M. Rouissat, M. Belkheir, H. S. A. Belkhira, A. Mokaddem, and D. Ziani, “Implementing and evaluating a new Silent Rank Attack in RPL-Contiki based IoT networks,” Journal of Electrical Engineering, vol. 74, no. 6, pp. 454–462, Dec. 2023, doi: 10.2478/jee-2023-0053.
- F. Zahra, N. Jhanjhi, S. N. Brohi, N. A. Khan, M. Masud, and M. A. AlZain, “Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning,” Sensors, vol. 22, no. 18, p. 6765, Sep. 2022, doi: 10.3390/s22186765.
- M.M Savitha, and P.I Basarkod, “Securing AMI-IoT networks against multiple RPL attacks using ensemble learning IDS and lightchain based prediction detection and mitigation mechanisms,” Information Security Journal: A Global Perspective, vol. 33, no. 1, pp. 73–95, Jun. 2023, doi: 10.1080/19393555.2023.2218852.
- A. O. Bang and U. P. Rao, “EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things,” Peer-to-Peer Networking and Applications, vol. 15, no. 1, pp. 642–665, Jan. 2022, doi: 10.1007/s12083-021-01275-3.
- P. S. Nandhini, S. Kuppuswami, S. Malliga, and R. DeviPriya, “Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers,” The Journal of Supercomputing, vol. 79, no. 6, pp. 6825–6848, Nov. 2022, doi: 10.1007/s11227-022-04921-6.
- M. Rouissat, M. Belkheir, I. S. Alsukayti, and A. Mokaddem, “A Lightweight Mitigation Approach against a New Inundation Attack in RPL-Based IoT Networks,” Applied Sciences, vol. 13, no. 18, p. 10366, Sep. 2023, doi: 10.3390/app131810366.
- M. Osman, J. He, F. M. M. Mokbal, N. Zhu, and S. Qureshi, “ML-LGBM: A Machine Learning Model Based on Light Gradient Boosting Machine for the Detection of Version Number Attacks in RPL-Based Networks,” IEEE Access, vol. 9, pp. 83654–83665, 2021, doi: 10.1109/access.2021.3087175.
- W. Choukri, H. Lamaazi, N. Benamar, “RPL rank attack detection using Deep Learning”. 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies, 2020
- A. M. Said, A. Yahyaoui, F. Yaakoubi, and T. Abdellatif, “Machine Learning Based Rank Attack Detection for Smart Hospital Infrastructure,” Lecture Notes in Computer Science, pp. 28–40, 2020, doi: 10.1007/978-3-030-51517-1_3.
- S. M. Muzammal, R. K. Murugesan, N. Z. Jhanjhi, M. Humayun, A. O. Ibrahim, and A. Abdelmaboud, “A TrustBased Model for Secure Routing against RPL Attacks in Internet of Things,” Sensors, vol. 22, no. 18, p. 7052, Sep. 2022, doi: 10.3390/s22187052.
- M. A. Boudouaia, A. Abouaissa, A. Ali‐Pacha, A. Benayache, and P. Lorenz, “RPL rank based‐attack mitigation scheme in IoT environment,” International Journal of Communication Systems, vol. 34, no. 13, Jul. 2021, doi: 10.1002/dac.4917.
- M. Saied, S. Guirguis, and M. Madbouly, “Review of artificial intelligence for enhancing intrusion detection in the internet of things,” Engineering Applications of Artificial Intelligence, vol. 127, p. 107231, Jan. 2024, doi: 10.1016/j.engappai.2023.107231.