Παρακαλώ χρησιμοποιήστε αυτό το αναγνωριστικό για να παραπέμψετε ή να δημιουργήσετε σύνδεσμο προς αυτό το τεκμήριο:
https://ruomo.lib.uom.gr/handle/7000/867
Πλήρης εγγραφή μεταδεδομένων
Πεδίο DC | Τιμή | Γλώσσα |
---|---|---|
dc.contributor.author | Simoglou, George | - |
dc.contributor.author | Violettas, George E. | - |
dc.contributor.author | Petridou, Sophia | - |
dc.contributor.author | Mamatas, Lefteris | - |
dc.date.accessioned | 2021-02-10T09:16:05Z | - |
dc.date.available | 2021-02-10T09:16:05Z | - |
dc.date.issued | 2021-02-08 | - |
dc.identifier | 10.1016/j.cose.2021.102219 | en_US |
dc.identifier.issn | 0167-4048 | en_US |
dc.identifier.uri | https://doi.org/10.1016/j.cose.2021.102219 | en_US |
dc.identifier.uri | https://ruomo.lib.uom.gr/handle/7000/867 | - |
dc.description.abstract | Internet of Things (IoT) is an emerging technology that has seen remarkable blossom over the last years. The growing interest for IPv6 constrained networks has made the Routing Protocol for Low Power and Lossy Networks (RPL) the standard routing solution, which has gained significant attention and maturity in the literature. However, due to the networks' open and possibly unattended environment of operation, as well as to the nodes’ constraints, the security of the protocol is a challenging issue, currently under thorough investigation. New and innovative Intrusion Detection Systems (IDSs) have been proposed in the literature over the last years to address the protocol's security issues. In that regard, our survey paper: i) begins with extracting a set of design requirements for RPL-related IDSs based on discussing the diversity of attacks on the protocol and investigating their impact; ii) continues with identifying best practices and gaps in an IDS design which are derived by studying the evolution of the related bibliography (2013-2020); and iii) concludes with a number of guidelines extracted once we map the 22 IDSs under study to the attacks they encounter and compare them in line with the design requirements we introduce. Our analysis considers feedback from the corresponding authors for a deeper investigation. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier | en_US |
dc.source | Computers & Security | en_US |
dc.subject | FRASCATI::Engineering and technology | en_US |
dc.subject | FRASCATI::Engineering and technology::Other engineering and technologies | en_US |
dc.subject.other | IoT | en_US |
dc.subject.other | RPL Routing Protocol | en_US |
dc.subject.other | Attacks | en_US |
dc.subject.other | Intrusion Detection Systems | en_US |
dc.title | Intrusion Detection Systems for RPL Security: A Comparative Analysis | en_US |
dc.type | Article | en_US |
dc.contributor.department | Τμήμα Εφαρμοσμένης Πληροφορικής | en_US |
local.identifier.firstpage | 102219 | en_US |
local.identifier.eissn | 0167-4048 | en_US |
Εμφανίζεται στις Συλλογές: | Τμήμα Εφαρμοσμένης Πληροφορικής |
Αρχεία σε αυτό το Τεκμήριο:
Αρχείο | Περιγραφή | Μέγεθος | Μορφότυπος | |
---|---|---|---|---|
COSE-RPL-IDS-AComparativeAnalysis.pdf | Manuscript | 2,45 MB | Adobe PDF | Προβολή/Ανοιγμα |
Τα τεκμήρια στο Αποθετήριο προστατεύονται από πνευματικά δικαιώματα, εκτός αν αναφέρεται κάτι διαφορετικό.