Παρακαλώ χρησιμοποιήστε αυτό το αναγνωριστικό για να παραπέμψετε ή να δημιουργήσετε σύνδεσμο προς αυτό το τεκμήριο: https://ruomo.lib.uom.gr/handle/7000/867
Πλήρης εγγραφή μεταδεδομένων
Πεδίο DCΤιμήΓλώσσα
dc.contributor.authorSimoglou, George-
dc.contributor.authorViolettas, George E.-
dc.contributor.authorPetridou, Sophia-
dc.contributor.authorMamatas, Lefteris-
dc.date.accessioned2021-02-10T09:16:05Z-
dc.date.available2021-02-10T09:16:05Z-
dc.date.issued2021-02-08-
dc.identifier10.1016/j.cose.2021.102219en_US
dc.identifier.issn0167-4048en_US
dc.identifier.urihttps://doi.org/10.1016/j.cose.2021.102219en_US
dc.identifier.urihttps://ruomo.lib.uom.gr/handle/7000/867-
dc.description.abstractInternet of Things (IoT) is an emerging technology that has seen remarkable blossom over the last years. The growing interest for IPv6 constrained networks has made the Routing Protocol for Low Power and Lossy Networks (RPL) the standard routing solution, which has gained significant attention and maturity in the literature. However, due to the networks' open and possibly unattended environment of operation, as well as to the nodes’ constraints, the security of the protocol is a challenging issue, currently under thorough investigation. New and innovative Intrusion Detection Systems (IDSs) have been proposed in the literature over the last years to address the protocol's security issues. In that regard, our survey paper: i) begins with extracting a set of design requirements for RPL-related IDSs based on discussing the diversity of attacks on the protocol and investigating their impact; ii) continues with identifying best practices and gaps in an IDS design which are derived by studying the evolution of the related bibliography (2013-2020); and iii) concludes with a number of guidelines extracted once we map the 22 IDSs under study to the attacks they encounter and compare them in line with the design requirements we introduce. Our analysis considers feedback from the corresponding authors for a deeper investigation.en_US
dc.language.isoenen_US
dc.publisherElsevieren_US
dc.sourceComputers & Securityen_US
dc.subjectFRASCATI::Engineering and technologyen_US
dc.subjectFRASCATI::Engineering and technology::Other engineering and technologiesen_US
dc.subject.otherIoTen_US
dc.subject.otherRPL Routing Protocolen_US
dc.subject.otherAttacksen_US
dc.subject.otherIntrusion Detection Systemsen_US
dc.titleIntrusion Detection Systems for RPL Security: A Comparative Analysisen_US
dc.typeArticleen_US
dc.contributor.departmentΤμήμα Εφαρμοσμένης Πληροφορικήςen_US
local.identifier.firstpage102219en_US
local.identifier.eissn0167-4048en_US
Εμφανίζεται στις Συλλογές: Τμήμα Εφαρμοσμένης Πληροφορικής

Αρχεία σε αυτό το Τεκμήριο:
Αρχείο Περιγραφή ΜέγεθοςΜορφότυπος 
COSE-RPL-IDS-AComparativeAnalysis.pdfManuscript2,45 MBAdobe PDFΠροβολή/Ανοιγμα


Τα τεκμήρια στο Αποθετήριο προστατεύονται από πνευματικά δικαιώματα, εκτός αν αναφέρεται κάτι διαφορετικό.