{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T04:09:57Z","timestamp":1767845397719,"version":"3.49.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031302282","type":"print"},{"value":"9783031302299","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-30229-9_12","type":"book-chapter","created":{"date-parts":[[2023,4,8]],"date-time":"2023-04-08T19:02:39Z","timestamp":1680980559000},"page":"177-193","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Evolving Lightweight Intrusion Detection Systems for\u00a0RPL-Based Internet of\u00a0Things"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4990-0785","authenticated-orcid":false,"given":"Ali","family":"Deveci","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9516-6892","authenticated-orcid":false,"given":"Selim","family":"Yilmaz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5814-9973","authenticated-orcid":false,"given":"Sevil","family":"Sen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,9]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","unstructured":"Alexander, R., et al.: RPL: IPv6 routing protocol for low-power and lossy networks. RFC 6550, March 2012. https:\/\/doi.org\/10.17487\/RFC6550, https:\/\/www.rfc-editor.org\/info\/rfc6550","DOI":"10.17487\/RFC6550"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Ar\u0131\u015f, A., Oktu\u011f, S.F.: Analysis of the RPL version number attack with multiple attackers. In: 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1\u20138. IEEE (2020)","DOI":"10.1109\/CyberSA49311.2020.9139695"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Aydogan, E., Yilmaz, S., Sen, S., Butun, I., Forsstr\u00f6m, S., Gidlund, M.: A central intrusion detection system for RPL-based industrial internet of things. In: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/WFCS.2019.8758024"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"183678","DOI":"10.1109\/ACCESS.2020.3029191","volume":"8","author":"S Cakir","year":"2020","unstructured":"Cakir, S., Toklu, S., Yalcin, N.: RPL attack detection and prevention in the internet of things networks using a GRU based deep learning. IEEE Access 8, 183678\u2013183689 (2020)","journal-title":"IEEE Access"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-030-61746-2_16","volume-title":"Ad-Hoc, Mobile, and Wireless Networks","author":"E Canbalaban","year":"2020","unstructured":"Canbalaban, E., Sen, S.: A cross-layer intrusion detection system for RPL-based internet of things. In: Grieco, L.A., Boggia, G., Piro, G., Jararweh, Y., Campolo, C. (eds.) ADHOC-NOW 2020. LNCS, vol. 12338, pp. 214\u2013227. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-61746-2_16"},{"key":"12_CR6","unstructured":"Cisco: Visual networking index: Forecast and trends, 2017\u20132022 White paper. https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/white-paper-c11-741490.html. Accessed 04 Apr 2020"},{"key":"12_CR7","unstructured":"Contiki-Ng: contiki-ng\/contiki-ng (2004). https:\/\/github.com\/contiki-ng\/contiki-ng\/wiki. Accessed 13 July 2021"},{"issue":"2","key":"12_CR8","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182\u2013197 (2002)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Dogan, C., Yilmaz, S., Sen, S.: Analysis of RPL objective functions with security perspective. In: SENSORNETS, pp. 71\u201380 (2022)","DOI":"10.5220\/0011011900003118"},{"key":"12_CR10","unstructured":"ECJ: A Java-based evolutionary computation research system (2017). https:\/\/cs.gmu.edu\/eclab\/projects\/ecj. Accessed 04 Apr 2022"},{"key":"12_CR11","series-title":"Natural Computing Series","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44874-8","volume-title":"Introduction to Evolutionary Computing","author":"AE Eiben","year":"2003","unstructured":"Eiben, A.E., Smith, J.E., et al.: Introduction to Evolutionary Computing. Natural Computing Series, vol. 53. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-662-44874-8"},{"issue":"3","key":"12_CR12","doi-asserted-by":"publisher","first-page":"1323","DOI":"10.1007\/s11277-019-06789-x","volume":"110","author":"DB Gothawal","year":"2020","unstructured":"Gothawal, D.B., Nagaraj, S.: Anomaly-based intrusion detection system in RPL by applying stochastic and evolutionary game models over IoT environment. Wirel. Pers. Commun. 110(3), 1323\u20131344 (2020)","journal-title":"Wirel. Pers. Commun."},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"Herberg, U., Clausen, T.: A comparative performance study of the routing protocols load and RPL with bi-directional traffic in low-power and lossy networks (LLN). In: Proceedings of the 8th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks. PE-WASUN 2011, pp. 73\u201380. Association for Computing Machinery, New York (2011). https:\/\/doi.org\/10.1145\/2069063.2069076","DOI":"10.1145\/2069063.2069076"},{"issue":"2","key":"12_CR14","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/BF00175355","volume":"4","author":"JR Koza","year":"1994","unstructured":"Koza, J.R.: Genetic programming as a means for programming computers by natural selection. Stat. Comput. 4(2), 87\u2013112 (1994)","journal-title":"Stat. Comput."},{"issue":"4","key":"12_CR15","doi-asserted-by":"publisher","first-page":"6396","DOI":"10.1109\/JIOT.2019.2897063","volume":"6","author":"F Li","year":"2019","unstructured":"Li, F., Shinde, A., Shi, Y., Ye, J., Li, X.Y., Song, W.: System statistics learning-based IoT security: Feasibility and suitability. IEEE Internet Things J. 6(4), 6396\u20136403 (2019)","journal-title":"IEEE Internet Things J."},{"key":"12_CR16","first-page":"459","volume":"18","author":"A Mayzaud","year":"2016","unstructured":"Mayzaud, A., Badonnel, R., Chrisment, I.: A taxonomy of attacks in RPL-based internet of things. Int. J. Netw. Secur. 18, 459\u2013473 (2016)","journal-title":"Int. J. Netw. Secur."},{"issue":"2","key":"12_CR17","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/TNSM.2017.2705290","volume":"14","author":"A Mayzaud","year":"2017","unstructured":"Mayzaud, A., Badonnel, R., Chrisment, I.: A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE Trans. Netw. Serv. Manage. 14(2), 472\u2013486 (2017)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"18","key":"12_CR18","doi-asserted-by":"publisher","first-page":"7052","DOI":"10.3390\/s22187052","volume":"22","author":"SM Muzammal","year":"2022","unstructured":"Muzammal, S.M., Murugesan, R.K., Jhanjhi, N.Z., Humayun, M., Ibrahim, A.O., Abdelmaboud, A.: A trust-based model for secure routing against RPL attacks in internet of things. Sensors 22(18), 7052 (2022)","journal-title":"Sensors"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: Cross-level sensor network simulation with Cooja. In: Proceedings. 2006 31st IEEE Conference on Local Computer Networks, pp. 641\u2013648. IEEE (2006)","DOI":"10.1109\/LCN.2006.322172"},{"issue":"8","key":"12_CR20","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"Raza, S., Wallgren, L., Voigt, T.: Svelte: real-time intrusion detection in the internet of things. Ad Hoc Netw. 11(8), 2661\u20132674 (2013)","journal-title":"Ad Hoc Netw."},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Sen, S.: A survey of intrusion detection systems using evolutionary computation. In: Bio-inspired Computation in Telecommunications, pp. 73\u201394. Elsevier (2015)","DOI":"10.1016\/B978-0-12-801538-4.00004-5"},{"key":"12_CR22","unstructured":"Statista: Internet of things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions). https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/. Accessed 10 Apr 2022"},{"key":"12_CR23","doi-asserted-by":"publisher","first-page":"107335","DOI":"10.1109\/ACCESS.2020.3000476","volume":"8","author":"L Vu","year":"2020","unstructured":"Vu, L., Nguyen, Q.U., Nguyen, D.N., Hoang, D.T., Dutkiewicz, E.: Deep transfer learning for IoT attack detection. IEEE Access 8, 107335\u2013107344 (2020)","journal-title":"IEEE Access"},{"issue":"1","key":"12_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","volume":"10","author":"SX Wu","year":"2010","unstructured":"Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1\u201335 (2010)","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"12_CR25","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2991\/ijcis.2018.25905181","volume":"12","author":"FY Yavuz","year":"2018","unstructured":"Yavuz, F.Y., Devrim, \u00dc., Ensar, G.: Deep learning for detection of routing attacks in the internet of things. Int. J. Comput. Intell. Syst. 12(1), 39 (2018)","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"12_CR26","doi-asserted-by":"publisher","first-page":"4405","DOI":"10.1109\/TIFS.2021.3096029","volume":"16","author":"S Y\u0131lmaz","year":"2021","unstructured":"Y\u0131lmaz, S., Aydogan, E., Sen, S.: A transfer learning approach for securing resource-constrained IoT devices. IEEE Trans. Inf. Forensics Secur. 16, 4405\u20134418 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"18","key":"12_CR27","doi-asserted-by":"publisher","first-page":"6765","DOI":"10.3390\/s22186765","volume":"22","author":"F Zahra","year":"2022","unstructured":"Zahra, F., Jhanjhi, N., Brohi, S.N., Khan, N.A., Masud, M., AlZain, M.A.: Rank and wormhole attack detection model for RPL-based internet of things using machine learning. Sensors 22(18), 6765 (2022)","journal-title":"Sensors"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-30229-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,9]],"date-time":"2023-04-09T23:08:21Z","timestamp":1681081701000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-30229-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031302282","9783031302299"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-30229-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"9 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EvoApplications","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Applications of Evolutionary Computation (Part of EvoStar)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brno","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"evoapplications2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.evostar.org\/2023\/evoapps\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"78","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}