Matches in SemOpenAlex for { <https://semopenalex.org/work/W4310676306> ?p ?o ?g. }
Showing items 1 to 59 of
59
with 100 items per page.
- W4310676306 endingPage "2374" @default.
- W4310676306 startingPage "2363" @default.
- W4310676306 abstract "Objectives: To detect rank attacks during topology establishment and updated the RPL Destination Oriented Directed Acyclic Graph (DODAG) formation algorithm. The algorithm’s distributed module runs across all participating nodes, while the centralized module runs in the sink. Methods: The integrity and authenticity of control messages transmitted among two nodes and the sink are verified using a lightweight Hashed Message Authentication Code - Light-weight One-way Cryptographic Hash Algorithm (HMAC-LOCHA). The Secured Technique to Detect and Avoid Malicious Nodes (STDAMN) technique is proposed to overcome the rank attack of the nodes. Findings: The proposed scheme STDAMN outperforms the LEADER and SBIDS schemes when considering 50% malicious nodes, the accuracy rate of STDAMN is 3% higher than LEADER and 17% higher than SBIDS in Security mode whereas it is 4% and 14% higher in non-security mode respectively in the decreased rank attack. Again considering 50% malicious nodes, the accuracy rate of STDAMN is 2% higher than LEADER and 13% higher than SBIDS in with- Security mode whereas it is 2.2% and 16.1% higher in without-security mode respectively in the increased rank attack. Also indeed, the false positive rate for STDAMN is lower by 72.5% and 72%, 15.3% and 21.2% whereas the false negative rate for STDAMN is lower by 77.2% and 62.1%, 32.5%, and 39.5% on average for with-security and without-security respectively than LEADER and SBIDS in the decreased rank attack. Novelty: This paper presents a rank attack detection approach for non-storing mode RPL used in IoT to cope with both increased and decreased rank attacks to address this issue. The performance of the suggested technique is assessed both conceptually and through simulation using the Contiki-based Cooja simulator. The proposed technique surpasses state-of-the-art rank attack detection techniques in terms of detection accuracy and false positive/negative rate while maintaining acceptable network performance, according to simulation results. Keywords: Security; RPL; Rank attack; HMAC; Malicious Node; DODAG" @default.
- W4310676306 created "2022-12-15" @default.
- W4310676306 creator A5023994296 @default.
- W4310676306 creator A5071129224 @default.
- W4310676306 date "2022-11-28" @default.
- W4310676306 modified "2023-10-01" @default.
- W4310676306 title "Secured Technique to Detect and Avoid Malicious Nodes in Internet of Things" @default.
- W4310676306 doi "https://doi.org/10.17485/ijst/v15i44.1387" @default.
- W4310676306 hasPublicationYear "2022" @default.
- W4310676306 type Work @default.
- W4310676306 citedByCount "0" @default.
- W4310676306 crossrefType "journal-article" @default.
- W4310676306 hasAuthorship W4310676306A5023994296 @default.
- W4310676306 hasAuthorship W4310676306A5071129224 @default.
- W4310676306 hasBestOaLocation W43106763061 @default.
- W4310676306 hasConcept C100485629 @default.
- W4310676306 hasConcept C11413529 @default.
- W4310676306 hasConcept C138885662 @default.
- W4310676306 hasConcept C141492731 @default.
- W4310676306 hasConcept C178489894 @default.
- W4310676306 hasConcept C27206212 @default.
- W4310676306 hasConcept C2778738651 @default.
- W4310676306 hasConcept C31258907 @default.
- W4310676306 hasConcept C38652104 @default.
- W4310676306 hasConcept C41008148 @default.
- W4310676306 hasConcept C80444323 @default.
- W4310676306 hasConcept C99138194 @default.
- W4310676306 hasConceptScore W4310676306C100485629 @default.
- W4310676306 hasConceptScore W4310676306C11413529 @default.
- W4310676306 hasConceptScore W4310676306C138885662 @default.
- W4310676306 hasConceptScore W4310676306C141492731 @default.
- W4310676306 hasConceptScore W4310676306C178489894 @default.
- W4310676306 hasConceptScore W4310676306C27206212 @default.
- W4310676306 hasConceptScore W4310676306C2778738651 @default.
- W4310676306 hasConceptScore W4310676306C31258907 @default.
- W4310676306 hasConceptScore W4310676306C38652104 @default.
- W4310676306 hasConceptScore W4310676306C41008148 @default.
- W4310676306 hasConceptScore W4310676306C80444323 @default.
- W4310676306 hasConceptScore W4310676306C99138194 @default.
- W4310676306 hasIssue "44" @default.
- W4310676306 hasLocation W43106763061 @default.
- W4310676306 hasOpenAccess W4310676306 @default.
- W4310676306 hasPrimaryLocation W43106763061 @default.
- W4310676306 hasRelatedWork W1511774205 @default.
- W4310676306 hasRelatedWork W2007970911 @default.
- W4310676306 hasRelatedWork W2009062394 @default.
- W4310676306 hasRelatedWork W2117782790 @default.
- W4310676306 hasRelatedWork W2132034299 @default.
- W4310676306 hasRelatedWork W2157901542 @default.
- W4310676306 hasRelatedWork W2543951870 @default.
- W4310676306 hasRelatedWork W3088876353 @default.
- W4310676306 hasRelatedWork W3210438939 @default.
- W4310676306 hasRelatedWork W3212548386 @default.
- W4310676306 hasVolume "15" @default.
- W4310676306 isParatext "false" @default.
- W4310676306 isRetracted "false" @default.
- W4310676306 workType "article" @default.