{"id":"https://openalex.org/W4213135943","doi":"https://doi.org/10.1109/tencon54134.2021.9707411","title":"Mitigation Technique against Network Isolation Attack on RPL in 6LoWPAN Network","display_name":"Mitigation Technique against Network Isolation Attack on RPL in 6LoWPAN Network","publication_year":2021,"publication_date":"2021-12-07","ids":{"openalex":"https://openalex.org/W4213135943","doi":"https://doi.org/10.1109/tencon54134.2021.9707411"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon54134.2021.9707411","pdf_url":null,"source":{"id":"https://openalex.org/S4363608113","display_name":"TENCON 2021 - 2021 IEEE Region 10 Conference (TENCON)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035150822","display_name":"Abhay Deep Seth","orcid":"https://orcid.org/0000-0002-6120-6307"},"institutions":[{"id":"https://openalex.org/I4210121466","display_name":"Indian Institute of Technology Bhilai","ror":"https://ror.org/02sscsx71","country_code":"IN","type":"funder","lineage":["https://openalex.org/I4210121466"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Abhay Deep Seth","raw_affiliation_strings":["Department of EECS, Indian Institute of Technology, Bhilai, India"],"affiliations":[{"raw_affiliation_string":"Department of EECS, Indian Institute of Technology, Bhilai, India","institution_ids":["https://openalex.org/I4210121466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052215348","display_name":"Santosh Biswas","orcid":"https://orcid.org/0000-0003-3020-4154"},"institutions":[{"id":"https://openalex.org/I4210121466","display_name":"Indian Institute of Technology Bhilai","ror":"https://ror.org/02sscsx71","country_code":"IN","type":"funder","lineage":["https://openalex.org/I4210121466"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Santosh Biswas","raw_affiliation_strings":["Department of EECS, Indian Institute of Technology, Bhilai, India"],"affiliations":[{"raw_affiliation_string":"Department of EECS, Indian Institute of Technology, Bhilai, India","institution_ids":["https://openalex.org/I4210121466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109227535","display_name":"Amit Kumar Dhar","orcid":null},"institutions":[{"id":"https://openalex.org/I4210121466","display_name":"Indian Institute of Technology Bhilai","ror":"https://ror.org/02sscsx71","country_code":"IN","type":"funder","lineage":["https://openalex.org/I4210121466"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Amit Kumar Dhar","raw_affiliation_strings":["Department of EECS, Indian Institute of Technology, Bhilai, India"],"affiliations":[{"raw_affiliation_string":"Department of EECS, Indian Institute of Technology, Bhilai, India","institution_ids":["https://openalex.org/I4210121466"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.949,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.509388,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":75,"max":78},"biblio":{"volume":null,"issue":null,"first_page":"68","last_page":"73"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/6lowpan","display_name":"6LoWPAN","score":0.73295915}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.81453335},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.74776256},{"id":"https://openalex.org/C99400001","wikidata":"https://www.wikidata.org/wiki/Q109775","display_name":"6LoWPAN","level":4,"score":0.73295915},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.6532524},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5612733},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5526128},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.43503714},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3779536},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.37427574},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.36495173},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3587277},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1594361},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon54134.2021.9707411","pdf_url":null,"source":{"id":"https://openalex.org/S4363608113","display_name":"TENCON 2021 - 2021 IEEE Region 10 Conference (TENCON)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":30,"referenced_works":["https://openalex.org/W1489146973","https://openalex.org/W1971673042","https://openalex.org/W1994608780","https://openalex.org/W2026609766","https://openalex.org/W2033347526","https://openalex.org/W2050834423","https://openalex.org/W2169339036","https://openalex.org/W2217512864","https://openalex.org/W2274012241","https://openalex.org/W2298500030","https://openalex.org/W2325877089","https://openalex.org/W2460667315","https://openalex.org/W2508317201","https://openalex.org/W2518735427","https://openalex.org/W2616194875","https://openalex.org/W2744442622","https://openalex.org/W2754649472","https://openalex.org/W2793573850","https://openalex.org/W2875475762","https://openalex.org/W2885043172","https://openalex.org/W2885968049","https://openalex.org/W2890378792","https://openalex.org/W2898193194","https://openalex.org/W2904959125","https://openalex.org/W2940181800","https://openalex.org/W2940796826","https://openalex.org/W3009103980","https://openalex.org/W3103489564","https://openalex.org/W3126568711","https://openalex.org/W4230622395"],"related_works":["https://openalex.org/W4254092637","https://openalex.org/W3099995967","https://openalex.org/W3038603970","https://openalex.org/W2970156422","https://openalex.org/W2967432447","https://openalex.org/W2914063152","https://openalex.org/W2902540732","https://openalex.org/W2096279182","https://openalex.org/W2066947438","https://openalex.org/W2026609766"],"abstract_inverted_index":{"Routing":[0,44],"is":[1,43,200,209],"critical":[2],"in":[3,20,64,82,173,187,211,239],"the":[4,24,57,65,72,75,80,83,88,97,103,116,121,124,128,132,146,162,174,185,195,221],"Internet":[5],"of":[6,13,61,74,79,111,123,127,148,189,194,213,217],"Things":[7],"(IoT)":[8],"environment,":[9,26],"which":[10],"encompasses":[11],"deployment":[12],"restrained":[14,28],"devices":[15,29,218],"like":[16],"sensors":[17],"and":[18,34,49,59,151,197,224],"RFIDs":[19],"a":[21,109,181],"large-scale.":[22],"In":[23,131,176],"IoT":[25,112],"these":[27],"together":[30],"form":[31],"Low":[32,47],"Power":[33],"Lossy":[35,50],"Networks.":[36,51],"The":[37,52,192,207,229],"routing":[38],"protocol":[39],"assimilated":[40],"for":[41,46],"LLNs":[42],"Protocol":[45],"power":[48],"Root":[53],"node":[54,93,107,118,140,150],"solely":[55],"manages":[56],"arrangement":[58],"maintenance":[60],"nodes":[62,78,114,153],"present":[63],"DODAG,":[66],"via":[67],"control":[68,129],"messages,":[69],"to":[70,87,95,120,161],"disseminate":[71],"information":[73],"network.":[76,175,191],"Multiple":[77],"LLN":[81],"DODAG":[84,98,188],"are":[85,154,158],"connected":[86,160],"root":[89,104,117,149,163],"node.":[90,105,164],"Therefore,":[91],"any":[92],"wants":[94],"join":[96],"must":[99],"have":[100],"connectivity":[101],"with":[102],"Adversary":[106],"isolates":[108],"group":[110],"network":[113,144],"from":[115,220],"due":[119],"vulnerability":[122],"flow":[125],"sequence":[126],"messages.":[130],"Network":[133],"Isolation":[134],"Attack":[135],"(NIA)":[136],"specifically,":[137],"an":[138],"adversary":[139],"forms":[141],"its":[142],"own":[143],"without":[145],"knowledge":[147],"victim":[152],"unaware":[155],"that":[156],"they":[157],"not":[159],"This":[165],"threat":[166,196],"creates":[167],"separate":[168],"topology,":[169],"packet":[170],"loss":[171],"etc":[172],"this":[177],"paper,":[178],"we":[179],"propose":[180],"mitigation":[182,198,231],"technique":[183,199,232],"against":[184,237],"NIA":[186,238],"6LoWPAN":[190],"effect":[193],"analyzed":[201,210],"through":[202],"simulation":[203],"using":[204],"Cooja":[205],"simulator.":[206],"performance":[208],"terms":[212],"metrics":[214],"i.e,":[215],"no.":[216],"isolated":[219],"sink":[222],"device":[223],"average":[225],"Packet":[226],"Delivery":[227],"Ratio.":[228],"proposed":[230],"performs":[233],"better":[234],"than":[235],"RPL":[236],"DODAG.":[240]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4213135943","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-05-06T07:30:10.112576","created_date":"2022-02-24"}