{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:57:15Z","timestamp":1742914635988,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030878719"},{"type":"electronic","value":"9783030878726"}],"license":[{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-87872-6_7","type":"book-chapter","created":{"date-parts":[[2021,9,21]],"date-time":"2021-09-21T04:02:39Z","timestamp":1632196959000},"page":"62-72","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Localizing Worst-Parent Rank Attack Using Intelligent Edges of Smart Buildings"],"prefix":"10.1007","author":[{"given":"G. V. K.","family":"Sasirekha","sequence":"first","affiliation":[]},{"given":"V.","family":"Bhanu Prakash","sequence":"additional","affiliation":[]},{"given":"Jyotsna","family":"Bapat","sequence":"additional","affiliation":[]},{"given":"Debabrata","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,22]]},"reference":[{"key":"7_CR1","volume-title":"6LoWPAN- The Wireless Embedded Internet","author":"Z Shelby","year":"2011","unstructured":"Shelby, Z., Bormann, C.: 6LoWPAN- The Wireless Embedded Internet, vol. 43. Wiley, New York (2011)"},{"key":"7_CR2","unstructured":"RPL: IPv6 Routing Protocol for Low Power and Lossy Networks, RFC Standard 6550, Mar (2012)"},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","first-page":"1571","DOI":"10.1007\/s11277-019-06485-w","volume":"108","author":"A Verma","year":"2019","unstructured":"Verma, A., Ranga, V.: Evaluation of network intrusion detection systems for RPL based 6LoWPAN networks in IoT. Wireless Pers. Commun. 108(3), 1571\u20131594 (2019)","journal-title":"Wireless Pers. Commun."},{"issue":"4","key":"7_CR4","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/MNET.011.1900651","volume":"34","author":"MA Boudouaia","year":"2020","unstructured":"Boudouaia, M.A., Ali-Pacha, A., Abouaissa, A., Lorenz, P.: Security Against Rank Attack in RPL Protocol. IEEE Network 34(4), 133\u2013139 (2020)","journal-title":"IEEE Network"},{"issue":"10","key":"7_CR5","doi-asserted-by":"publisher","first-page":"3685","DOI":"10.1109\/JSEN.2013.2266399","volume":"13","author":"A Le","year":"2013","unstructured":"Le, A., Loo, L., Lasebae, A., Vinel, A., Chen, Y., Chai, M.: The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sens. J. 13(10), 3685\u20133692 (2013). https:\/\/doi.org\/10.1109\/JSEN.2013.2266399","journal-title":"IEEE Sens. J."},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1186\/s42400-021-00077-7A","volume":"4","author":"A Khraisat","year":"2021","unstructured":"Khraisat, A., Alazab, A.: A critical review of intrusion detection systems in the internet of things techniques, deployment strategy, validation strategy, attacks, public datasets, and challenges. Cybersecur 4, 18 (2021). https:\/\/doi.org\/10.1186\/s42400-021-00077-7A","journal-title":"Cybersecur"},{"issue":"4","key":"7_CR7","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.3390\/s21041026","volume":"21","author":"AM Said","year":"2021","unstructured":"Said, A.M., Yahyaoui, A., Abdellatif, T.: Efficient anomaly detection for smart hospital IoT systems. Sensors 21(4), 1026 (2021)","journal-title":"Sensors"},{"issue":"21","key":"7_CR8","doi-asserted-by":"publisher","first-page":"5997","DOI":"10.3390\/s20215997","volume":"20","author":"ZA Almusaylim","year":"2020","unstructured":"Almusaylim, Z.A., Jhanjhi, N., Alhumam, A.: Detection and mitigation of rpl rank and version number attacks in the internet of things: SRPL-RP. Sensors 20(21), 5997 (2020)","journal-title":"Sensors"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"43665","DOI":"10.1109\/ACCESS.2020.2977476","volume":"8","author":"I Wadhaj","year":"2020","unstructured":"Wadhaj, I., Ghaleb, B., Thomson, C., Al-Dubai, A., Buchanan, W.J.: Mitigation mechanisms against the dao attack on the routing protocol for low power and lossy networks (RPL). IEEE Access 8, 43665\u201343675 (2020)","journal-title":"IEEE Access"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Farzaneh, B., Montazeri, M.A., Jamali, S.: An anomaly-based IDS for detecting attacks in rpl-based internet of things. In: 5th International Conference on Web Research (ICWR), pp. 61\u201366 (2019)","DOI":"10.1109\/ICWR.2019.8765272"},{"key":"7_CR11","unstructured":"https:\/\/thenewstack.io\/azure-iot-edge-a-technology-primer\/, Accessed 1.06.2021"},{"key":"7_CR12","unstructured":"Mayzaud, A.: Monitoring and Security for the RPL-based Internet of Things. Cryptography and Security [cs.CR]. Universit\u00e9 de Lorraine, (2016)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Le, A., Loo, J., Luo, Y., Lasebae, A.: Specification-based IDS for securing RPL from topology attacks. In: IFIP Wireless Days (WD), pp. 1\u20133 (2011)","DOI":"10.1109\/WD.2011.6098218"},{"key":"7_CR14","unstructured":"http:\/\/anrg.usc.edu\/contiki\/index.php\/Cooja_Simulator. Accessed 1 June 2021."},{"key":"7_CR15","unstructured":"https:\/\/towardsdatascience.com\/understanding-boxplots-5e2df7bcbd51. Accessed 1 June 2021"},{"key":"7_CR16","unstructured":"https:\/\/www.datacamp.com\/community\/tutorials\/svm-classification-scikit-learn-python. Accessed 1 June 2021"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: XGBoost: A Scalable Tree Boosting System. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016)","DOI":"10.1145\/2939672.2939785"}],"container-title":["Advances in Intelligent Systems and Computing","14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87872-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T07:04:12Z","timestamp":1642835052000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87872-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,22]]},"ISBN":["9783030878719","9783030878726"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87872-6_7","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021,9,22]]},"assertion":[{"value":"22 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS - ICEUTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computational Intelligence in Security for Information Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bilbao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisis-spain2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.iceuteconference.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}