Skip Content
You are currently on the new version of our website. Access the old version .

33 Results Found

  • Review
  • Open Access
41 Citations
5,577 Views
20 Pages

17 September 2020

The Internet of things (IoT) is a concept that has gained traction over the last decade. IoT networks have evolved around the wireless sensor network (WSN), and the following research looks at relevant IoT concepts and the different security issues t...

  • Article
  • Open Access
700 Views
44 Pages

IbiboRPLChain II: A Blockchain-Enhanced Security Framework for Mitigating Routing Attacks in IoT-RPL Networks

  • Joshua T. Ibibo,
  • Josiah E. Balota,
  • Tariq F. M. Alwada’N and
  • Olugbenga O. Akinade

7 November 2025

The Internet of Things (IoT) continues to expand rapidly, with the Routing Protocol for Low-Power and Lossy Networks (RPL) serving as its core communication backbone. However, RPL remains vulnerable to a range of insider routing attacks such as the V...

  • Article
  • Open Access
53 Citations
6,101 Views
20 Pages

A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things

  • Syeda Mariam Muzammal,
  • Raja Kumar Murugesan,
  • Noor Zaman Jhanjhi,
  • Mamoona Humayun,
  • Ashraf Osman Ibrahim and
  • Abdelzahir Abdelmaboud

17 September 2022

In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with the increase in the number of IoT applications and devices globally. T...

  • Article
  • Open Access
19 Citations
3,616 Views
28 Pages

Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security

  • Umer Farooq,
  • Muhammad Asim,
  • Noshina Tariq,
  • Thar Baker and
  • Ali Ismail Awad

16 June 2022

Recently, the Internet of Things (IoT) has emerged as an important way to connect diverse physical devices to the internet. The IoT paves the way for a slew of new cutting-edge applications. Despite the prospective benefits and many security solution...

  • Article
  • Open Access
23 Citations
5,910 Views
23 Pages

13 April 2023

Effective security support still remains a challenge even for a standardized Internet of Things network protocol such as the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL). It provides limited protection against external security attack...

  • Article
  • Open Access
39 Citations
4,414 Views
25 Pages

Trust and Mobility-Based Protocol for Secure Routing in Internet of Things

  • Syeda Mariam Muzammal,
  • Raja Kumar Murugesan,
  • NZ Jhanjhi,
  • M. Shamim Hossain and
  • Abdulsalam Yassine

18 August 2022

In the Internet of Things (IoT), the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and features. Among various RPL security solutions, a trust-based security...

  • Article
  • Open Access
113 Citations
5,914 Views
25 Pages

22 October 2020

The rapid growth of the Internet of Things (IoT) and the massive propagation of wireless technologies has revealed recent opportunities for development in various domains of real life, such as smart cities and E-Health applications. A slight defense...

  • Article
  • Open Access
1 Citations
1,487 Views
29 Pages

Enhancing IoT-LLN Security with IbiboRPLChain Solution: A Blockchain-Based Authentication Method

  • Joshua T. Ibibo,
  • Josiah E. Balota,
  • Tariq Alwada'n and
  • Olugbenga O. Akinade

29 September 2025

The security of Internet of Things (IoT)–Low-Power and Lossy Networks (LLNs) is crucial for their widespread adoption in various applications. The standard routing protocol for IoT-LLNs, IPv6 Routing Protocol over Low-Power and Lossy Networks (...

  • Review
  • Open Access
71 Citations
7,394 Views
44 Pages

A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things

  • Taief Alaa Al-Amiedy,
  • Mohammed Anbar,
  • Bahari Belaton,
  • Arkan Hammoodi Hasan Kabla,
  • Iznan H. Hasbullah and
  • Ziyad R. Alashhab

29 April 2022

The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resou...

  • Article
  • Open Access
40 Citations
7,805 Views
30 Pages

A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks

  • Philokypros P. Ioulianou,
  • Vassilios G. Vassilakis and
  • Siamak F. Shahandashti

Routing attacks are a major security issue for Internet of Things (IoT) networks utilising routing protocols, as malicious actors can overwhelm resource-constrained devices with denial-of-service (DoS) attacks, notably rank and blackhole attacks. In...

  • Review
  • Open Access
9 Citations
4,309 Views
32 Pages

15 January 2024

Low-Power and Lossy Networks (LLNs) have grown rapidly in recent years owing to the increased adoption of Internet of Things (IoT) and Machine-to-Machine (M2M) applications across various industries, including smart homes, industrial automation, heal...

  • Article
  • Open Access
44 Citations
4,921 Views
25 Pages

Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks

  • Yahya Al Sawafi,
  • Abderezak Touzene and
  • Rachid Hedjam

Internet of things (IoT) has become an emerging technology transforming everyday physical objects to be smarter by using underlying technologies such as sensor networks. The routing protocol for low-power and lossy networks (RPL) is considered one of...

  • Article
  • Open Access
381 Views
17 Pages

30 December 2025

The rapid expansion of Internet of Things (IoT) systems in critical infrastructures has raised significant concerns regarding network security and reliability. In particular, RPL (Routing Protocol for Low-Power and Lossy Networks), widely adopted in...

  • Article
  • Open Access
16 Citations
4,536 Views
28 Pages

Protocol-Specific and Sensor Network-Inherited Attack Detection in IoT Using Machine Learning

  • F. Zahra,
  • N. Z. Jhanjhi,
  • N. A. Khan,
  • Sarfraz Nawaz Brohi,
  • Mehedi Masud and
  • Sultan Aljahdali

15 November 2022

For networks with limited resources, such as IoT-enabled smart homes, smart industrial equipment, and urban infrastructures, the Routing Protocol for Low-power and Lossy Networks (RPL) was developed. Additionally, a number of optimizations have been...

  • Article
  • Open Access
11 Citations
3,479 Views
25 Pages

FL-DSFA: Securing RPL-Based IoT Networks against Selective Forwarding Attacks Using Federated Learning

  • Rabia Khan,
  • Noshina Tariq,
  • Muhammad Ashraf,
  • Farrukh Aslam Khan,
  • Saira Shafi and
  • Aftab Ali

8 September 2024

The Internet of Things (IoT) is a significant technological advancement that allows for seamless device integration and data flow. The development of the IoT has led to the emergence of several solutions in various sectors. However, rapid popularizat...

  • Article
  • Open Access
4 Citations
3,744 Views
20 Pages

Toward Resilient Wireless Sensor Networks: A Virtualized Perspective

  • Adnan Rashid,
  • Tommaso Pecorella and
  • Francesco Chiti

13 July 2020

The Internet of Things (IoT) has been one of the main focus areas of the research community in recent years, the requirements of which help network administrators to design and ensure the functionalities and resources of each device. Generally, two t...

  • Article
  • Open Access
27 Citations
3,475 Views
45 Pages

Securing Smart Healthcare Cyber-Physical Systems against Blackhole and Greyhole Attacks Using a Blockchain-Enabled Gini Index Framework

  • Mannan Javed,
  • Noshina Tariq,
  • Muhammad Ashraf,
  • Farrukh Aslam Khan,
  • Muhammad Asim and
  • Muhammad Imran

23 November 2023

The increasing reliance on cyber-physical systems (CPSs) in critical domains such as healthcare, smart grids, and intelligent transportation systems necessitates robust security measures to protect against cyber threats. Among these threats, blackhol...

  • Article
  • Open Access
37 Citations
4,721 Views
20 Pages

28 December 2022

Technological breakthroughs in the Internet of Things (IoT) easily promote smart lives for humans by connecting everything through the Internet. The de facto standardised IoT routing strategy is the routing protocol for low-power and lossy networks (...

  • Protocol
  • Open Access
9 Citations
3,517 Views
21 Pages

A Subjective Logical Framework-Based Trust Model for Wormhole Attack Detection and Mitigation in Low-Power and Lossy (RPL) IoT-Networks

  • Sarmad Javed,
  • Ahthasham Sajid,
  • Tayybah Kiren,
  • Inam Ullah Khan,
  • Christine Dewi,
  • Francesco Cauteruccio and
  • Henoch Juli Christanto

29 August 2023

The increasing use of wireless communication and IoT devices has raised concerns about security, particularly with regard to attacks on the Routing Protocol for Low-Power and Lossy Networks (RPL), such as the wormhole attack. In this study, the autho...

  • Article
  • Open Access
16 Citations
2,815 Views
29 Pages

A Lightweight Mitigation Approach against a New Inundation Attack in RPL-Based IoT Networks

  • Mehdi Rouissat,
  • Mohammed Belkheir,
  • Ibrahim S. Alsukayti and
  • Allel Mokaddem

16 September 2023

Internet of Things (IoT) networks are being widely deployed for a broad range of critical applications. Without effective security support, such a trend would open the doors to notable security challenges. Due to their inherent constrained characteri...

  • Article
  • Open Access
52 Citations
5,545 Views
17 Pages

Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning

  • F. Zahra,
  • NZ Jhanjhi,
  • Sarfraz Nawaz Brohi,
  • Navid Ali Khan,
  • Mehedi Masud and
  • Mohammed A. AlZain

7 September 2022

The proliferation of the internet of things (IoT) technology has led to numerous challenges in various life domains, such as healthcare, smart systems, and mission-critical applications. The most critical issue is the security of IoT nodes, networks,...

  • Article
  • Open Access
4 Citations
2,149 Views
22 Pages

Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains

  • Iain Baird,
  • Baraq Ghaleb,
  • Isam Wadhaj,
  • Gordon Russell and
  • William J. Buchanan

31 August 2024

In the evolving landscape of the Internet of Things (IoT), ensuring the security and integrity of data transmission remains a paramount challenge. Routing Protocol for Low-Power and Lossy Networks (RPL) is commonly utilized in IoT networks to facilit...

  • Review
  • Open Access
38 Citations
5,877 Views
25 Pages

The Wireless Sensor Network in the Internet of Things (WSN-IoT) has been flourishing as another global breakthrough over the past few years. The WSN-IoT is reforming the way we live today by spreading through all areas of life, including the dangerou...

  • Article
  • Open Access
2 Citations
2,755 Views
21 Pages

Exploring the Potential Role of Ribosomal Proteins to Enhance Potato Resilience in the Face of Changing Climatic Conditions

  • Eliana Valencia-Lozano,
  • Lisset Herrera-Isidrón,
  • Jorge Abraham Flores-López,
  • Osiel Salvador Recoder-Meléndez,
  • Braulio Uribe-López,
  • Aarón Barraza and
  • José Luis Cabrera-Ponce

18 July 2023

Potatoes have emerged as a key non-grain crop for food security worldwide. However, the looming threat of climate change poses significant risks to this vital food source, particularly through the projected reduction in crop yields under warmer tempe...

  • Article
  • Open Access
35 Citations
4,703 Views
24 Pages

A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT

  • Carlos D. Morales-Molina,
  • Aldo Hernandez-Suarez,
  • Gabriel Sanchez-Perez,
  • Linda K. Toscano-Medina,
  • Hector Perez-Meana,
  • Jesus Olivares-Mercado,
  • Jose Portillo-Portillo,
  • Victor Sanchez and
  • Luis Javier Garcia-Villalba

3 May 2021

At present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security inf...

  • Article
  • Open Access
7 Citations
2,712 Views
32 Pages

Performance Evaluation of Mobile RPL-Based IoT Networks under Hello Flood Attack

  • Amal Hkiri,
  • Sami Alqurashi,
  • Omar Ben Bahri,
  • Mouna Karmani,
  • Hamzah Faraj and
  • Mohsen Machhout

The RPL protocol is essential for efficient communication within the Internet of Things (IoT) ecosystem, yet it remains vulnerable to various attacks, particularly in dense and mobile environments where it shows certain limitations and susceptibiliti...

  • Article
  • Open Access
28 Citations
5,931 Views
19 Pages

Routing Attacks Detection in 6LoWPAN-Based Internet of Things

  • Ammar Alazab,
  • Ansam Khraisat,
  • Sarabjot Singh,
  • Savitri Bevinakoppa and
  • Osama A. Mahdi

The Internet of Things (IoT) has become increasingly popular, and opened new possibilities for applications in various domains. However, the IoT also poses security challenges due to the limited resources of the devices and its dynamic network topolo...

  • Article
  • Open Access
322 Views
22 Pages

7 January 2026

The use of resource-constrained Low-Power and Lossy Networks (LLNs), where the IPv6 Routing Protocol for LLNs (RPL) is the de facto routing standard, has increased due to the Internet of Things’ (IoT) explosive growth. Because of the dynamic na...

  • Article
  • Open Access
29 Citations
4,036 Views
27 Pages

An Intrusion Detection System for RPL-Based IoT Networks

  • Eric Garcia Ribera,
  • Brian Martinez Alvarez,
  • Charisma Samuel,
  • Philokypros P. Ioulianou and
  • Vassilios G. Vassilakis

5 December 2022

The Internet of Things (IoT) has become very popular during the last decade by providing new solutions to modern industry and to entire societies. At the same time, the rise of the industrial Internet of Things (IIoT) has provided various benefits by...

  • Article
  • Open Access
10 Citations
3,537 Views
36 Pages

4 November 2021

The high level of security requirements and low capabilities of constrained devices that are connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an authentication solution that deals with the problem of energy c...

  • Article
  • Open Access
4 Citations
3,012 Views
22 Pages

9 March 2024

The Internet of Things (IoT) is empowering various sectors and aspects of daily life. Green IoT systems typically involve Low-Power and Lossy Networks (LLNs) with resource-constrained nodes. Lightweight routing protocols, such as the Routing Protocol...

  • Article
  • Open Access
32 Citations
4,251 Views
19 Pages

MHSEER: A Meta-Heuristic Secure and Energy-Efficient Routing Protocol for Wireless Sensor Network-Based Industrial IoT

  • Anshika Sharma,
  • Himanshi Babbar,
  • Shalli Rani,
  • Dipak Kumar Sah,
  • Sountharrajan Sehar and
  • Gabriele Gianini

19 May 2023

Several industries use wireless sensor networks (WSN) for various tasks such as monitoring, data transmission, and data gathering. They find applications in the industrial internet of things (IIoT). WSNs are utilized to track and monitor changes in t...

  • Article
  • Open Access
5 Citations
2,063 Views
17 Pages

Lightweight Path Recovery in IPv6 Internet-of-Things Systems

  • Zhuoliu Liu,
  • Luwei Fu,
  • Maojun Pan and
  • Zhiwei Zhao

In an Internet-of-Things system supported by Internet Protocol version 6 (IPv6), the Routing Protocol for Low-Power and Lossy Networks (RPL) presents extensive applications in various network scenarios. In these novel scenarios characterized by the a...