Stephen, 2021
Stephen, 2021
net/publication/352738207
CITATION READS
1 222
2 authors, including:
Stephen .A
St. Joseph's College of Tiruchchirappalli
6 PUBLICATIONS 9 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Stephen .A on 25 June 2021.
Internet of Things is one of the trending technologies in the cotemporary world which
allows all the technologies to work together as a single system. The “things” connected in the
IoT environment could be anything such as objects, physical/virtual things and human beings.
The communication between these connected things should be secured. Otherwise, intruders can
misuse the data collected from the IoT environment. So, there is a necessity of providing better
routing mechanism for IoT to provide secure communication against various attacks in IoT.
Several protocols are used for routing in IoT. IPv6 Routing Protocol for Low Power and Lossy
Networks (RPL) is one of the protocols in IoT based system. In this paper, various attacks
against RPL protocol are listed out, analyzed and distinguished from each other.
1. Introduction
Internet of Things is a technology where the physical things are interconnected through
the internet which have unique identities and their own functionalities. The functionalities can be
sensing, actuation, sharing information, analyzing and processing the sensed data. Since sensitive
data are collected using IoT technology, the communication path should be secured. The
attackers can misuse the data in the communication process.
http://annalsofrscb.ro 9767
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
Application layer It is responsible for providing application oriented services to the users.
There are lots of issues in these three layers. This paper focuses various attacks against the
routing protocol RPL.
Routing protocol is used in the communication process among the nodes in the network. Routing
in Internet of Things is classified into two types such as proactive (dynamic path selection
process) and reactive (senders nodes trigger the route discovery).
1.4 RPL
Routing Protocol for low power and Lossy networks (RPL) is an IPv6 routing protocol used
in IoT environment. RPL falls in proactive category which dynamically seeks for the routing
path.
http://annalsofrscb.ro 9768
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
The attacks during the communication process can be mitigated by using proactive techniques. It
uses Destination Oriented Directed Acyclic Graph (DODAG) for routing. It uses control
messages to form DODAG. Fig 1.2 shows the DODAG construction process. A parent node
broadcasts DODAG Information Object (DIO) message to neighboring nodes. The neighboring
nodes which receive the DIO message will send DODAG Advertisement Object (DAO) to the
parent node. After accepting the DAO messages from the neighboring node, the parent node will
send the DAO_Acklogement (DAO_ACK) message to its children to join in the network. If a
new node comes, it has to broadcast DODAG Information Solicitation (DIS) message to join the
network which has the configuration. Table 1.1 describes the RPL control messages.
This paper is organized into different sections. Section 2 lists out the various attacks against RPL
protocol; Section 3 distinguishes the various attacks; Section 4 gives Literature review; Section 5
gives the results and discussions and Section 6 concludes the paper.
Various attacks such as sinkhole attack, Sybil attack, selective forwarding attack, black
hole attack, hello flood attack, wormhole attack, rank attack and version number attack were
occurred while using RPL routing protocol in IoT.
http://annalsofrscb.ro 9769
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
Sinkhole attack
Sinkhole attack is an attack where compromised node tries to entice network traffic by
masquerading as legitimate node in routing process. The sinkhole attack blocks the base station
from obtaining legitimate information; it causes threat and makes the way for occurrences of
other attacks too.
Sybil attack
Sybil is an attack where a malicious node creates multiple fake identities at the same time
in the network. It does not allow the packets of a node to be sent to the destination.
Selective forwarding is an attack where the malicious nodes neglect to forward the
messages to precise destination nodes or simply drop the messages not to propagate anymore.
Blackhole attack
A black hole is an attack where the attacker node claims as it has shortest path to the
destination. It drops the routing packets and does not propagate the packets to the precise
destination.
Hello flood attack is an attack where an adversary node sends the hello messages to the
neighbor nodes to disturb the network.
Wormhole attack
Wormhole attack is an attack where two or more adversary nodes are connected with
the link called wormhole link and the nodes form the tunnels to broadcast the data packets into
the network. It makes the network to be confused and disrupt the communication process over
the network.
Rank attack
In RPL protocol, the rank value determines the position of each node in the network. The
rank value of a node is used to select the parents and routes. The rank of a node increases in a
http://annalsofrscb.ro 9770
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
downward direction and decreases in an upward direction. A malicious node is changing the
legitimate rank value into falls rank value is called rank attack.
2. Literature Review
2.1 Internet of Things overview and security issues & challenges based on RPL
Eleonora Borgia et al.[9] described the key features, driving technologies and issues and
challenges in Internet of Things. The different phases involved in IoT environment were clearly
explained. The IoT applications were listed out with brief descriptions.
Gordana et al.[16] described the various standard organizations which had given
architectural framework for the Internet of Things. The design issues of hardware and software
were explained with precise examples. The contribution of Nano technology in IoT was
articulated.
VipindevAdat et al.[46] had given the overview with the design of architecture in IoT.
The authors analyzed various attacks in the IoT routing protocols such as 6LoWPAN and RPL.
The challenges and the security issues were explained.
Anthea et al.[3] articulated a taxonomy of attacks in RPL based Internet of Things. The
taxonomy consisted of three main categories such as attacks targeting network resources, attacks
modifying the network topology and attacks related to network traffic. These categories of
attacks were distinguished from each other. The risk management concern with the attacks was
clearly discussed.
Linus wallgren et al.[22] presented an overview of IoT technologies and routing attacks.
The network protocols such as 6LoWPAN, CoPA/COAPS and RPL were clearly discussed. The
concept behind IDS in IoT was explained. The attacks against RPL namely selective forwarding
attack, sink hole attack, hello flood attack, wormhole attack, clone ID and Sybil attack were
described, checked and implemented using Contiki and Cooja simulator.
http://annalsofrscb.ro 9771
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
In [44], intrusion detection system was designed to detect sinkhole attack at edge level internet of
thing environment. The proposed intrusion detection system was efficient to detect all possible
types of sinkhole attack in edge based Internet of Things. The proposed IDS named as SAD-
EIOT. NS2 simulator was used to simulate the SAD-IOT system. The SAD-IOT was suitable for
surveillance security and monitoring system. A detection accuracy of 95.83% was achieved with
the false positive rate of 1.93%. Throughput, packet delivery ratio, packet lose rate and end to
end delay were distinguished in the form of normal flow, under attack and proposed schema.
In [24], the authors proposed an algorithm to detect sinkhole attack based on energy
consumption. In the algorithm, a node will send the control message to the main base station
before sending its data to its base station. The control message is compared with its
corresponding data hop by hop. The malicious node was detected based on the variation in the
control messages. The proposed sinkhole attack detection algorithm was compared with Ngai’s
algorithm. The algorithm worked better than the Ngai’s algorithm. It was also used for detecting
wormhole attack.
Geroge et al.[14] analyzed the existing techniques to detect sinkhole attack in wireless
sensor network such as rule based, anomaly based detection, statistical method, hybrid based
intrusion detection and key management. The sinkhole attack was defined and explained with
graphical representation. The challenges in detection of sinkhole attack like communication
pattern in wireless sensor networks, unpredictable sinkhole attack, insider attack and resource
constraints and physical attack were discussed.
In [7], an intrusion detection system (IDS) was proposed to detect sinkhole attack. The
proposed IDS detected the sinkhole attack and mitigated the destructive effects which were
identified in the networks. They combined watchdog, reputation and trust strategies to detect
attacker based on the behavior of the devices. The proposed technique was divided into four
modules namely cluster configuration routing monitoring, attack detection and attack isolation.
The system was implemented in the Cooja simulator. The UDS was compared with SVELTE in
terms of detection accuracy in fixed scenario and mobile scenario and false positive rate. The
detection accuracy for SVELTE in fixed scenario was 90%, the detection accuracy for INTI in
fixed scenario was 92%. The detection accuracy for SVELTE in mobile scenario was 24%, the
http://annalsofrscb.ro 9772
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
detection accuracy for INTI in fixed scenario was 70%. The false positive rate for SVELTE was
38%, the false positive rate for INTI was 28%.
In [25], the mechanisms to detect sinkhole attack on ipv6 over low power wireless
personal area network were surveyed. The paper analyzed the mechanisms called VERA,
TRAIL, Secure Parent, and SVLTE. INTI and Specification based mechanisms were
distinguished with each other.
In [32], the intrusion detection system to prevent an active sinkhole attack in Internet of
things was presented. In this proposed system, the whole network was divided into clusters of
Internet of Things. All the devices were connected with their concerned gateways. The intrusion
system was deployed into the gateways. The gateways analyzed the communication over the
devices and detected the anomalies using the proposed IDS. The base station had all the records
and all the activities over the IOT environment. At the situation of sinkhole attack in the
connected network, the base station sent the alert to all the connected devices in the network. The
proposed IDS model outperformed in terms of packet delivery ratio (PDR) and energy
consumption.
Stephen et al.[42] proposed an active detection technique to detect sinkhole attack. The
technique comprised of three phases. The first phase was construction of DODAG, the second
phase was detection of sinkhole attack, and the third was sinkhole attack treatment. The
technique was simulated using Cooja simulator.
In [23], the light weight technique called Neighbor Passive Monitoring Technique for
detecting sinkhole attacks in RPL networks (NPMT) was proposed. The proposed technique
comprised of two phases. The first phase was used to identify the suspicious nodes in the
network based on inconsistent changes in the nodes rank. The second phase was used to detect
the sinkhole attack from the suspicious nodes. The proposed technique was compared with the
existing technique SVELTE. The proposed technique NPMT performed better than SVELTE.
The technique was implemented using Cooja simulator.
Geroge et al.[13] described the existing techniques to identify sinkhole attack in wireless
sensor networks(WSNs). The challenges in WSNs were elucidated in detail. The different
approaches used for mitigating sinkhole attacks were explained.
http://annalsofrscb.ro 9773
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
Stephen et al.[43] proposed intrusion detection system to detect sinkhole attack on RPL
protocol. The IDS used number of packets transmitted and received to detect sinkhole attack
based on the intrusion ratio. The alert message was sent to leaf nodes after identifying the
intruder node in the network.
In [20], the authors took the survey on Sybil attacks and their defense scheme in internet
of things. The authors classified the Sybil attack into three types such as SA-1, SA-2and SA-3,
based on the capabilities of the Sybil attack. The comparisons of three types of attack were given
in a table. The Sybil attack defense scheme like social graph based Sybil detection
(SGSD),behavior classification based Sybil detection (BCSD), and mobile sybil detection were
explained in detail. The research issues based on sybil attack were discussed.
In [33], the mechanism to solve sinkhole attack was introduced. The mechanism was
robust and lightweight. The sinkhole attack was identified based on received signal strength
indicator (RSSI). The proposed mechanism was stable enough in the static environment.
In [38], the system for detecting both direct and indirect Sybil attack in Internet of Things
was recommended. The system utilized localization information dissemination such as received
signal strength indicator and the ratio of RSSI for each neighbor nodes. The proposed detection
system produced low overhead in network.
In [27], authors proposed two different techniques to detect sybil attack for a forest wild
fire monitoring application. The first technique was a two tire method which used the high
energy nodes operating at lower level. The second technique was residual energy based detection.
After detecting the sybil attack, the cluster head was elected by the nominee packets. The
legitimate packets were identified by looking at the cluster head in the packet. The proposed
technique resulted high detection accuracy and low false-negative rate.
http://annalsofrscb.ro 9774
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
In [10], various attacks were analyzed against RPL. Sybil attack was analyzed in detail.
The RPL protocol was affected more by the sybil attack in mobile environment compared with
static environment. It was found that the sybil attack decreased the packet delivery ratio and
increased the control messages overhead in RPL protocol.
In [8], the study was done on techniques to detect sybil attack based on network features,
cryptography and relationship between neighbors nodes in IoT. After analyzing the several
techniques, the authors concluded that there is a need to develop an efficient technique for
detecting and mitigating sybil attack in IoT.
In [1], authors presented a comprehensive analytical survey on sybil attack in IoT. The
authors classified the sybil attack into three phases namely compromise phase, deployment phase
and launching phase. The algorithm using K-means clustering was proposed to visualize the
deployment selection procedure of the attacker. The algorithm achieved 48.7% in clustering
affected nodes and the legitimate nodes in the IoT.
In [28], a technique to detect sybil attack based on RSSI value in wireless sensor
networks (WSN) was introduced. The technique was tested by multiple receivers using their
RSSI ratio. The proposed technique achieved 100% to detect sybil attack and produced less false
positive.
In [18], a method to detect and eliminate selective forwarding attack using adaptive
learning automata and communication quality was proposed. This method was used for ordinary
selective forwarding attack and special case of selective forwarding attack. Packet loss was
considered as metric to detect selective forwarding attack. The proposed method was simulated
using OMNeT++. The method was compared with the existing method CLAIDS which was
proposed by Fathinavid and Ansari.
http://annalsofrscb.ro 9775
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
In [45], authors discussed four selective forwarding detection techniques such as Public
Key Encryption (PKE), Rivest Shamir Adelemen (RSA), ELGMAL and Chinese Remainder
Theorem (CRT). These four techniques were evaluated based on storage space required, energy
consumption and time consumption for key management. The authors concluded that minimum
storage was required for public key encryption and minimum energy consumption were required
for CRT based RSA techniques.
In [11], an Intrusion Detection System (IDS) to prevent nodes from selective forwarding
attack based on mobile wireless sensor networks was proposed. The proposed IDS was novel
with the combination of sequential probability ratio test with an adaptive threshold of acceptable
probability of dropped packets. The IDS used four steps namely data gathering, data analysis,
detection, elimination and compromised node setup. It was evaluated using Cooja simulator and
performed 100% of detection probability.
In [31], provenance based method to detect selective forwarding attack in RPL based
internet of Things was introduced. Each data in the network was consisted of unique sequence
number, payload and packet delivery ratio. Packet delivery ratio was used to identify the
malicious nodes in the IoT network. The proposed method was simulated using Cooja simulator.
Provenance generation time and provenance size were taken as performance metrics.
In [35], an algorithm to detect and mitigate selective forwarding attack using efficient fuzzy path
selection approach in wireless sensor networks was proposed. The proposed algorithm was
comprised of two phases. The first phase was detecting compromised nodes in the network. The
second phase was to mitigate selective forwarding attack by generating new disjoint path using
average link residual energy and relative hop count. The proposed algorithm was evaluated in the
real environment by deploying various sensors in a rectangular area.
http://annalsofrscb.ro 9776
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
In [4], authors proposed a trust based mechanism to tackle blackhole attack in RPL
protocol. Packet delivery ratio of the node was taken as the trust value. The proposed mechanism
was used in two levels namely inter-DODAG level and intra-DODAG level. It was implemented
using Cooja simulator.
In [38], blackhole attack in Internet of Thigs (IoT) and Wireless Sensor Networks (WSN)
were discussed. Authors gave comparative analysis of various existing techniques of blackhole
attack. The analysis was done based on energy consumption, network traffic, packet delivery
ratio, throughput and end to end delay. The simulation tools used for detecting and mitigating
blackhole attack were discussed.
Firoz et al.[12] proposed an algorithm to mitigate blackhole attack in routing protocol for
low power and lossy networks. The proposed technique consisted of local decision and global
verification process. Each node in the network monitored the communication behavior of its
neighboring nodes by overhearing packets transmitted by neighboring nodes. The second process
was to identify the suspicious nodes. The suspicious nodes were verified by changes in their
http://annalsofrscb.ro 9777
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
behavior. The confirmed malicious nodes‟ IDs were broadcasted to the other nodes by the
alternative path in the network. The technique was simulated by Cooja simulator.
In [19], case study was done on blockhole attack in 6LoWPAN-RPL. Blackhole attack
was tested using Cooja simulator. It was found that blackhole attack increased end to end delay
and packet delivery ratio of the nodes in the network. It was also found that the malicious nodes
rapidly affected the legitimate nodes.
Anhtuan et al.[2] explained types of internal threats and their impact on WSN. RPL
protocol was clearly explained with its operation in the WSN. RPL attacks were described in
detail. The parameters of DODAG and the control messages of DODAG were clearly explained.
Contiki OS and Cooja simulator were used for the simulation process.
Stephen et al.[38] proposed the technique called energy based validation and verification
(E2V) for detecting and mitigating rank attack (RA) over RPL. The proposed technique used
three phases namely rank calculation, substation and malicious node elimination. The technique
was used to solve the rank inconsistency attack.
Ghada et al.[15] proposed a secure routing technique based on RPL for Internet of things.
The proposed method was used to prevent nodes from the malicious nodes in the network. The
author had taken the rank property to provide secure routing. Rank threshold and hash chain
authentication were used to deal with the attackers nodes. The proposed method was
implemented using Contiki OS and Cooja simulator. It outperformed the existing techniques
http://annalsofrscb.ro 9778
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
Section three explains various attack scenario with concerned diagram. Green color
nodeindicates source node. Red colour node indicates malicious node. Brown colour indicates
destination node. Blue colour nodes indicate neighbor nodes
Name of the
S. No Description Diagram
attack
Selective
The malicious nodes selectively
3 Forwarding
drops or forward the packets
Attack
http://annalsofrscb.ro 9779
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
The different types of mechanisms which are used for detecting and mitigating
RPL attacks are listed out in the table 4.1 based on the attack type.
http://annalsofrscb.ro 9780
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
5. Conclusion
IoT is the current trending technology. It requires global connectivity and accessibility so
that anyone can access IoT devices anywhere at any time. So security plays a vital role in the IoT
technology to provide the access control and the secure communication. In this paper, IoT
security issues and attacks related to RPL are clearly explained. Based on the survey on RPL
attacks, it is a necessary to provide a novel technique to mitigate these attacks.
REFERENCES
[1] Alekha Kumar Mishra, Asis Kumar Tripathy, Deepak Puthal, and Laurence T. Yang,
"Analytical model for sybil attack phases in internet of things", IEEE Internet of Things
Journal, Vol. 6, Issue 1, pp. 379-387, 2018.
[2] Anhtuan Le, Jonathan Loo, AboubakerLasebae, Alexey Vinel, Yue Chen and Michael
Chai, “The impact of rank attack on network topology of routing protocol for low-power
and lossy networks, IEEE Sensors Journal, Vol. 13, Issue 10, pp.3685-3692, 2013.
http://annalsofrscb.ro 9781
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
http://annalsofrscb.ro 9782
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
[12] Firoz Ahmed and Young-Bae Ko, "Mitigation of black hole attacks in Routing Protocol
for Low Power and Lossy Networks", Security and Communication Networks, Vol. 9,
Issue 18, pp 5143-5154, 2016.
[13] George W. Kibirige and Camilius Sanga, "A survey on detection of sinkhole attack in
wireless sensor network", arXiv preprint arXiv:1505.01941, 2015.
[14] Geroge W Kibirige and Camilius Sanga, “A survey on Detection of Sinkhole Attack in
Wireless Sensor Network”, International Journal of Computer Science and Information
Security, pp. 1-9, 2015.
[15] GhadaGlissa, AbderrezakRachedi and ArefMeddeb, "A secure routing protocol based on
RPL for Internet of Things", In 2016 IEEE Global Communications Conference
(GLOBECOM), pp. 1-7, 2016.
[16] GordanaGardasevic, MladenVeletic, NebojsaMaletic, DraganVasiljevic, Igor
Radusinovic, SlavicaTomovic and MilutinRadonjic, “The IoT Architectural Framework,
Design Issues and Application Domains”, DOI 10.1007/s11277-016-3842-3, pp. 1-22,
2016.
[17] Himanshu B. Patel and Devesh C. Jinwala, "Blackhole detection in 6LoWPAN based
internet of things: an anomaly based approach",In TENCON 2019-2019 IEEE Region 10
Conference (TENCON), pp. 947-954, 2019.
[18] Hongliang Zhu1, Zhihua Zhang , Juan Du1, Shoushan Luo1 and Yang Xin, "Detection
of selective forwarding attacks based on adaptive learning automata and communication
quality in wireless sensor networks", International Journal of Distributed Sensor
Networks, Vol. 14, Issue 11, pp. 1-15, 2018.
[19] KarishmaChugh, AboubakerLasebae and Jonathan Loo, "Case study of a black hole
attack on LoWPAN-RPL", In Proc. of the Sixth International Conference on Emerging
Security Information, Systems and Technologies (SECURWARE), Rome, Italy (August
2012), pp. 157-162, 2012.
[20] Kuan Zhang, Xiaohui Liang, Rongxing Lu and Xuemin Shen, "Sybil attacks and their
defenses in the internet of things", IEEE Internet of Things Journal, Vol.1, Issue 5, pp.
372-383, 2014.
http://annalsofrscb.ro 9783
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
http://annalsofrscb.ro 9784
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
[31] Sabah Suhail, Shashi Raj Pandey and ChoongSeon Hong, "Detection of Selective
Forwarding Attack in RPL-Based Internet of Things through Provenance", pp 965-967,
2018.
[32] Sabeen Tahir, Sheikh Tahir Bakhsh and Rayan A Alsemmeari, "An intrusion detection
system for the prevention of an active sinkhole routing attack in Internet of
things", International Journal of Distributed Sensor Networks Vol 15, Issue 11, pp. 1-10,
2019.
[33] Salavat Marian, PopaMircea, "Sybil attack type detection in wireless sensor networks
based on received signal strength indicator detection scheme", In 2015 IEEE 10th Jubilee
International Symposium on Applied Computational Intelligence and Informatics, pp.
121-124, 2015.
[34] Salehi, S. Ahmad, M. A. Razzaque, ParisaNaraei, and Ali Farrokhtala, "Detection of
sinkhole attack in wireless sensor networks", In 2013 IEEE International Conference on
Space Science and Communication (IconSpace), pp. 361-365, 2013.
[35] SeyyitAlperSert, Carol Fung, Roy George and Adnan Yazıcı, "An efficient fuzzy path
selection approach to mitigate selective forwarding attacks in wireless sensor networks",
In 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1-6, 2017.
[36] ShaplaKhanam, Ismail Ahmedyand Mohd Yamani Idna Idris, "An efficient detection of
selective forwarding attacks in heterogeneous IoT Networks", pp 1-8, 2017.
[37] Shoukat Ali, Dr. Muazzam A Khan, Jawad Ahmad, Asad W. Malik, and AnisurRehman,
"Detection and prevention of Black Hole Attacks in IOT & WSN", In 2018 Third
International Conference on Fog and Mobile Edge Computing (FMEC), pp. 217-226,
2018.
[38] Sohail Abbas, "An Efficient Sybil Attack Detection for Internet of Things", In World
Conference on Information Systems and Technologies, pp. 339-349, 2019.
[39] Stephen. R and Arockiam. L, “RDAID: Rank Increased Attack IDentification Algorithm
for Internet of Things”, International Journal of Scientific Research in Computer Science
Applications and Management Studies, Volume. 7, Issue 3, pp 1-5, 2018.
[40] Stephen. R and Arockiam. L, “RDAIDRPL: Rank Increased Attack IDentification
Algorithm for Avoiding Loop in the RPL DODAG”, International Journal of Pure and
Applied Mathematics, Vol. 119, Issue 16, pp.1-8, 2018.
http://annalsofrscb.ro 9785
Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 9767 - 9786
Received 05 March 2021; Accepted 01 April 2021.
[41] Stephen. R and Arockiam. L, “E2V: Techniques for Detecting and Mitigating Rank
\Inconsistency Attack (RInA) in RPL based Internet of Things”, Journal of Physics,
doi:10.1088/1742-6596/1142/1/012009, pp. 1-13, 2018.
[42] Stephen, A. Dalvin Vinoth Kumar and L. Arockiam, "Deist: dynamic detection of
Sinkhole attack for Internet of Things", International Journal of Engineering and
Computer Science, Vol. 5, Issue 12, pp. 19358-19362,2016.
[43] Stephen, R., and L. Arockiam, "Intrusion detection system to detect sinkhole attack on
RPL protocol in Internet of Things", International Journal of Electrical Electronics and
Computer Science, Vol 4, Issue 4, pp. 16-20, 2017.
[44] SumitPundir, Mohammad Wazid, DeveshPratap Singh, Ashok Kumar Das, Joel J. P. C.
Rodrigues and Youngho Park, "Designing Efficient Sinkhole Attack Detection
Mechanism in Edge-Based IoT Deployment", Sensors Vol. 20, Issue 5, 1-27, 2020.
[45] Surinder Singh, Hardeep Singh Saini, "Detection Techniques for Selective Forwarding
Attack in Wireless Sensor Networks", International Journal of Recent Technology and
Engineering (IJRTE), Vol. 7, Issue 6S, pp. 380-383, 2019.
[46] VipindevAdat and B. B. Gupta, “Security in Internet of Things: issues, challenges,
taxonomy, and architecture”, DOI 10.1007/s11235-017-0345-9, pp. 1-99, 2017.
http://annalsofrscb.ro 9786