{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:43:17Z","timestamp":1770748997395,"version":"3.50.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:00:00Z","timestamp":1740096000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:00:00Z","timestamp":1740096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s10922-025-09908-1","type":"journal-article","created":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:16:00Z","timestamp":1740122160000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Lightweight Novel Approach for Collaborative Packet-Based Mitigation of Blackhole Attacks in RPL-Based IoT"],"prefix":"10.1007","volume":"33","author":[{"given":"Mohammed","family":"Belkheir","sequence":"first","affiliation":[]},{"given":"Mehdi","family":"Rouissat","sequence":"additional","affiliation":[]},{"given":"Allel","family":"Mokaddem","sequence":"additional","affiliation":[]},{"given":"Djamila","family":"Ziani","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Lorenz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,21]]},"reference":[{"key":"9908_CR1","doi-asserted-by":"publisher","first-page":"5637","DOI":"10.1007\/s00170-022-08990-y","volume":"131","author":"J Cheng","year":"2024","unstructured":"Cheng, J., Yang, Y., Zou, X., et al.: 5G in manufacturing: A literature review and future research. Int. J. Adv. Manuf. Technol. 131, 5637\u20135659 (2024). https:\/\/doi.org\/10.1007\/s00170-022-08990-y","journal-title":"Int. J. Adv. Manuf. Technol."},{"key":"9908_CR2","doi-asserted-by":"publisher","unstructured":"Jamshidi, M., Yahya, S.I., Nouri, L., Hashemi-Dezaki, H., Rezaei, A., Chaudhary, M.A.: A super-efficient GSM triplexer for 5G-enabled IoT in sustainable smart grid edge computing and the metaverse. Sensors. 23(7) (2023). https:\/\/doi.org\/10.3390\/s23073775","DOI":"10.3390\/s23073775"},{"key":"9908_CR3","doi-asserted-by":"publisher","first-page":"83507","DOI":"10.1109\/ACCESS.2022.3196657","volume":"10","author":"IA Bartsiokas","year":"2022","unstructured":"Bartsiokas, I.A., Gkonis, P.K., Kaklamani, D.I., Venieris, I.S.: ML-based radio resource management in 5G and beyond networks: A survey. IEEE Access. 10, 83507\u201383528 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3196657","journal-title":"IEEE Access."},{"key":"9908_CR4","doi-asserted-by":"publisher","unstructured":"Gohar, A., Nencioni, G.: The role of 5G technologies in a smart city: The case for intelligent transportation system. Sustainability. 13(9) (2021). https:\/\/doi.org\/10.3390\/su13095188","DOI":"10.3390\/su13095188"},{"key":"9908_CR5","doi-asserted-by":"publisher","unstructured":"Perez, A.J., Siddiqui, F., Zeadally, S., Lane, D.: A review of IoT systems to enable independence for the elderly and disabled individuals. Internet Things. 21 (2023). https:\/\/doi.org\/10.1016\/j.iot.2022.100653","DOI":"10.1016\/j.iot.2022.100653"},{"issue":"16","key":"9908_CR6","doi-asserted-by":"publisher","first-page":"7194","DOI":"10.3390\/s23167194","volume":"23","author":"R Chataut","year":"2023","unstructured":"Chataut, R., Phoummalayvane, A., Akl, R.: Unleashing the power of IoT: A comprehensive review of IoT applications and future prospects in healthcare, agriculture, smart homes, smart cities, and industry 4.0. Sensors. 23(16), 7194 (2023). https:\/\/doi.org\/10.3390\/s23167194","journal-title":"Sensors"},{"key":"9908_CR7","doi-asserted-by":"publisher","unstructured":"Mudholkar, M., Mudholkar, P.: Empowering agricultural ecosystems: Leveraging 5\u00a0g iot for enhanced product integrity and sustainable ecological environments. J. Inf. Educ. Res. 4(1) (2024). https:\/\/doi.org\/10.52783\/jier.v4i1.605","DOI":"10.52783\/jier.v4i1.605"},{"key":"9908_CR8","doi-asserted-by":"publisher","first-page":"5977","DOI":"10.1007\/s12652-020-02521-x","volume":"14","author":"M Attaran","year":"2023","unstructured":"Attaran, M.: The impact of 5G on the evolution of intelligent automation and industry digitization. J. Ambient Intell. Hum. Comput. 14, 5977\u20135993 (2023). https:\/\/doi.org\/10.1007\/s12652-020-02521-x","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"9908_CR9","doi-asserted-by":"publisher","unstructured":"Bedogni, L., Picone, M., Pietri, M., Mamei, M., Zambonelli, F.: January. Fluid computing in the internet of things: A digital twin approach. In 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC) (pp. 412\u2013418). IEEE. (2024). https:\/\/doi.org\/10.1109\/SGRE59715.2024.10428786","DOI":"10.1109\/SGRE59715.2024.10428786"},{"key":"9908_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3293993","author":"HR Chi","year":"2023","unstructured":"Chi, H.R., de F\u00e1tima Domingues, M., Zhu, H., Li, C., Kojima, K., Radwan, A.: Healthcare 5.0: In the perspective of consumer internet-of-things-based fog\/cloud computing. IEEE Trans. Consum. Electron. (2023). https:\/\/doi.org\/10.1109\/TCE.2023.3293993","journal-title":"IEEE Trans. Consum. Electron."},{"key":"9908_CR11","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-981-99-0252-1_4","volume-title":"Digital twin Driven Intelligent Systems and Emerging Metaverse","author":"S Fur","year":"2023","unstructured":"Fur, S., Heithoff, M., Michael, J., Netz, L., Pfeiffer, J., Rumpe, B., Wortmann, A.: Sustainable digital twin engineering for the internet of production. In: Digital twin Driven Intelligent Systems and Emerging Metaverse, pp. 101\u2013121. Springer Nature Singapore., Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-0252-1_4"},{"key":"9908_CR12","doi-asserted-by":"publisher","unstructured":"Rizwan, A., Ahmad, R., Khan, A.N., Xu, R., Kim, D.H.: Intelligent digital twin for federated learning in aiot networks. Internet Things. 22 (2023). https:\/\/doi.org\/10.1016\/j.iot.2023.100698","DOI":"10.1016\/j.iot.2023.100698"},{"issue":"1","key":"9908_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/spe.3243","volume":"54","author":"SN Srirama","year":"2024","unstructured":"Srirama, S.N.: A decade of research in fog computing: Relevance, challenges, and future directions. Software: Pract. Experience. 54(1), 3\u201323 (2024). https:\/\/doi.org\/10.1002\/spe.3243","journal-title":"Software: Pract. Experience"},{"key":"9908_CR14","doi-asserted-by":"publisher","unstructured":"Duolikun, D., Enokido, T., Takizawa, M.: February. A flexible fog computing (FTBFC) model to reduce energy consumption of the IoT. In International Conference on Emerging Internetworking, Data & Web Technologies (pp. 256\u2013267). Cham: Springer International Publishing. (2023). https:\/\/doi.org\/10.1007\/978-3-031-26281-4_26","DOI":"10.1007\/978-3-031-26281-4_26"},{"key":"9908_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30101-8_12","volume-title":"6G Enabled Fog Computing in IoT","author":"SA Ansar","year":"2023","unstructured":"Ansar, S.A., Samriya, J.K., Kumar, M., Gill, S.S., Khan, R.A.: Intelligent Fog-IoT networks with 6G endorsement: Foundations, applications, trends and challenges. In: Kumar, M., Gill, S.S., Samriya, J.K., Uhlig, S. (eds.) 6G Enabled Fog Computing in IoT. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30101-8_12"},{"key":"9908_CR16","doi-asserted-by":"publisher","unstructured":"Ruan, Z.: November. Blockchain technology for security issues and challenges in IoT. In 2023 International Conference on Computer Simulation and Modeling, Information Security (CSMIS) (pp. 572\u2013580). IEEE. (2023). https:\/\/doi.org\/10.1109\/CSMIS60634.2023.00108.","DOI":"10.1109\/CSMIS60634.2023.00108"},{"key":"9908_CR17","doi-asserted-by":"publisher","unstructured":"Taherdoost, H.: Security and internet of things: Benefits, challenges, and future perspectives. Electronics. 12(8) (2023). https:\/\/doi.org\/10.3390\/electronics12081901","DOI":"10.3390\/electronics12081901"},{"key":"9908_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.iotcps.2023.06.003","volume":"4","author":"A Rejeb","year":"2024","unstructured":"Rejeb, A., Rejeb, K., Appolloni, A., Jagtap, S., Iranmanesh, M., Alghamdi, S., Alhasawi, Y., Kayikci, Y.: Unleashing the power of internet of things and blockchain: A comprehensive analysis and future directions. Internet Things Cyber-Physical Syst. 4, 1\u201318 (2024). https:\/\/doi.org\/10.1016\/j.iotcps.2023.06.003","journal-title":"Internet Things Cyber-Physical Syst."},{"key":"9908_CR19","doi-asserted-by":"publisher","unstructured":"Dargaoui, S., Azrour, M., Allaoui, E., Amounas, A., Guezzaz, F., Attou, A., Hazman, H., Benkirane, C., S. and, Bouazza, S.H.: An overview of the security challenges in IoT environment. Advanced technology for smart environment and energy, pp.151\u2013160. (2023). https:\/\/doi.org\/10.1007\/978-3-031-25662-2_13","DOI":"10.1007\/978-3-031-25662-2_13"},{"key":"9908_CR20","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s11277-023-10773-x","volume":"133","author":"Y Kumar","year":"2023","unstructured":"Kumar, Y., Kumar, V.A.: Systematic review on intrusion detection system in Wireless networks: Variants, attacks, and applications. Wirel. Pers. Commun. 133, 395\u2013452 (2023). https:\/\/doi.org\/10.1007\/s11277-023-10773-x","journal-title":"Wirel. Pers. Commun."},{"key":"9908_CR21","doi-asserted-by":"publisher","first-page":"3753","DOI":"10.1007\/s10586-022-03776-z","volume":"26","author":"A Heidari","year":"2023","unstructured":"Heidari, A., Jabraeil Jamali, M.A.: Internet of things intrusion detection systems: A comprehensive review and future directions. Cluster Comput. 26, 3753\u20133780 (2023). https:\/\/doi.org\/10.1007\/s10586-022-03776-z","journal-title":"Cluster Comput."},{"key":"9908_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3386468","author":"H Albinali","year":"2024","unstructured":"Albinali, H., Azzedin, F.: Towards RPL attacks and Mitigation Taxonomy: Systematic literature Review Approach. IEEE Trans. Netw. Serv. Manage. (2024). https:\/\/doi.org\/10.1109\/TNSM.2024.3386468","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"9908_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-8865-3_30","volume-title":"Advances in Signal Processing, Embedded Systems and IoT","author":"N Panda","year":"2023","unstructured":"Panda, N., Supriya, M.: Blackhole Attack Prediction in Wireless Sensor Networks using support Vector Machine. In: Chakravarthy, V., Bhateja, V., Fuentes, F., Anguera, W., Vasavi, J., K.P. (eds.) Advances in Signal Processing, Embedded Systems and IoT. Lecture Notes in Electrical Engineering, vol. 992. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-19-8865-3_30"},{"issue":"1","key":"9908_CR24","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.jer.2024.01.014","volume":"12","author":"IA Reshi","year":"2024","unstructured":"Reshi, I.A., Sholla, S., Najar, Z.A.: Safeguarding IoT networks: Mitigating black hole attacks with an innovative defense algorithm. J. Eng. Res. 12(1), 133\u2013139 (2024). https:\/\/doi.org\/10.1016\/j.jer.2024.01.014","journal-title":"J. Eng. Res."},{"issue":"18","key":"9908_CR25","doi-asserted-by":"publisher","first-page":"10366","DOI":"10.3390\/app131810366","volume":"13","author":"M Rouissat","year":"2023","unstructured":"Rouissat, M., Belkheir, M., Alsukayti, I.S., Mokaddem, A.: A lightweight mitigation approach against a new inundation attack in RPL-based IoT networks. Appl. Sci. 13(18), 10366 (2023). https:\/\/doi.org\/10.3390\/app131810366","journal-title":"Appl. Sci."},{"key":"9908_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ISPA54004.2022.9786370","volume":"Mostaganem, Alg","author":"M Belkheir","year":"2022","unstructured":"Belkheir, M., Rouissat, M., Achraf Boukhobza, A., Mokaddem, M., Bouziani, M.: A new lightweight solution against the version number attack in RPL-based IoT networks. 2022 7th Int. Conf. Image Signal. Process. Their Appl. (ISPA). Mostaganem, Algeria, 1\u20136 (2022). https:\/\/doi.org\/10.1109\/ISPA54004.2022.9786370","journal-title":"2022 7th Int. Conf. Image Signal. Process. Their Appl. (ISPA)"},{"key":"9908_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-2115-7_4","volume-title":"Artificial Intelligence and Cyber Security in Industry 4.0. Advanced Technologies and Societal Change","author":"K Manasa","year":"2023","unstructured":"Manasa, K., Leo Joseph, L.M.I.: IoT Security vulnerabilities and defensive measures in industry 4.0. In: Sarveshwaran, V., Chen, J.I.Z., Pelusi, D. (eds.) Artificial Intelligence and Cyber Security in Industry 4.0. Advanced Technologies and Societal Change. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-2115-7_4"},{"issue":"4","key":"9908_CR28","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1080\/23742917.2023.2228053","volume":"7","author":"M Aziz Al Kabir","year":"2023","unstructured":"Aziz Al Kabir, M., Elmedany, W., Sharif, M.S.: Securing IOT devices against emerging security threats: Challenges and mitigation techniques. J. Cyber Secur. Technol. 7(4), 199\u2013223 (2023). https:\/\/doi.org\/10.1080\/23742917.2023.2228053","journal-title":"J. Cyber Secur. Technol."},{"key":"9908_CR29","doi-asserted-by":"publisher","unstructured":"Omar, A.A.R.A.C., Soudan, B.: A comprehensive survey on detection of sinkhole attack in routing over low power and Lossy network for internet of things. Internet Things. 22 (2023). https:\/\/doi.org\/10.1016\/j.iot.2023.100750","DOI":"10.1016\/j.iot.2023.100750"},{"key":"9908_CR30","doi-asserted-by":"publisher","unstructured":"Bala, B., Behal, S.: AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges. Comput. Sci. Rev. 52 (2024). https:\/\/doi.org\/10.1016\/j.cosrev.2024.100631","DOI":"10.1016\/j.cosrev.2024.100631"},{"key":"9908_CR31","doi-asserted-by":"publisher","unstructured":"Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J.P., Alexander, R.: RFC 6550: RPL: IPv6 routing protocol for low-power and Lossy Networks. (2012). https:\/\/doi.org\/10.17487\/RFC6550","DOI":"10.17487\/RFC6550"},{"key":"9908_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-031-33631-7_1","volume-title":"Wireless Networks: Cyber Security Threats and Countermeasures","author":"A El Hajjar","year":"2023","unstructured":"El Hajjar, A.: Key-pre distribution for the internet of things challenges, threats and recommendations. In: Wireless Networks: Cyber Security Threats and Countermeasures, pp. 1\u201342. Springer International Publishing., Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-33631-7_1"},{"issue":"6","key":"9908_CR33","doi-asserted-by":"publisher","first-page":"454","DOI":"10.2478\/jee-2023-0053","volume":"74","author":"M Rouissat","year":"2023","unstructured":"Rouissat, M., Belkheir, M., Belkhira, H.S., Mokaddem, A., Ziani, D.: Implementing and evaluating a new Silent Rank Attack in RPL-Contiki based IoT networks. J. Electr. Eng. 74(6), 454\u2013462 (2023). https:\/\/doi.org\/10.2478\/jee-2023-0053","journal-title":"J. Electr. Eng."},{"key":"9908_CR34","doi-asserted-by":"publisher","unstructured":"Deveci, A., Yilmaz, S., Sen, S.: April. Evolving lightweight intrusion detection systems for RPL-based Internet of Things. In International Conference on the Applications of Evolutionary Computation (Part of EvoStar) (pp. 177\u2013193). Cham: Springer Nature Switzerland. (2023). https:\/\/doi.org\/10.1007\/978-3-031-30229-9_12","DOI":"10.1007\/978-3-031-30229-9_12"},{"key":"9908_CR35","doi-asserted-by":"publisher","unstructured":"Hkiri, A., Karmani, M., Bahri, O.B., Murayr, A.M., Alasmari, F.H., Machhout, M.: RPL-Based IoT networks under decreased Rank Attack: Performance analysis in Static and Mobile environments. Computers Mater. Continua. 78(1) (2024). https:\/\/doi.org\/10.32604\/cmc.2023.047087","DOI":"10.32604\/cmc.2023.047087"},{"key":"9908_CR36","doi-asserted-by":"publisher","unstructured":"Alsukayti, I.S., Alreshoodi, M.: RPL-based IoT networks under simple and complex routing security attacks: An experimental study. Appl. Sci. 13(8) (2023). https:\/\/doi.org\/10.3390\/app13084878","DOI":"10.3390\/app13084878"},{"key":"9908_CR37","doi-asserted-by":"crossref","unstructured":"Bokka, R., Sadasivam, T.: Simulation-based Analysis of RPL Routing Attacks and Their Impact on IoT Network Performance, pp. 1\u201315. Journal of Electronic Testing (2024)","DOI":"10.1007\/s10836-024-06106-w"},{"key":"9908_CR38","doi-asserted-by":"publisher","unstructured":"Omar, A.A.R.A., Soudan, B., Altaweel, A.: UOS_IOTSH_2024: A Comprehensive Network Traffic dataset for sinkhole attacks in diverse RPL IoT networks. Data Brief. p110650 (2024). https:\/\/doi.org\/10.1016\/j.dib.2024.110650","DOI":"10.1016\/j.dib.2024.110650"},{"issue":"3","key":"9908_CR39","first-page":"459","volume":"18","author":"A Mayzaud","year":"2016","unstructured":"Mayzaud, A., Badonnel, R., Chrisment, I.: A taxonomy of attacks in RPL-based internet of things. Int. J. Netw. Secur. 18(3), 459\u2013473 (2016)","journal-title":"Int. J. Netw. Secur."},{"key":"9908_CR40","doi-asserted-by":"publisher","unstructured":"Garcia Ribera, E., Martinez Alvarez, B., Samuel, C., Ioulianou, P.P., Vassilakis, V.G.: An intrusion detection system for RPL-based IoT networks. Electronics. 11(23) (2022). https:\/\/doi.org\/10.3390\/electronics11234041","DOI":"10.3390\/electronics11234041"},{"key":"9908_CR41","doi-asserted-by":"publisher","first-page":"16979","DOI":"10.1007\/s11227-024-06118-5","volume":"80","author":"K Ahmadi","year":"2024","unstructured":"Ahmadi, K., Javidan, R.: A novel RPL defense mechanism based on trust and deep learning for internet of things. J. Supercomput. 80, 16979\u201317003 (2024). https:\/\/doi.org\/10.1007\/s11227-024-06118-5","journal-title":"J. Supercomput"},{"key":"9908_CR42","doi-asserted-by":"publisher","first-page":"2380","DOI":"10.1007\/s12083-023-01539-0","volume":"16","author":"P Deepavathi","year":"2023","unstructured":"Deepavathi, P., Mala, C.I.M.D.R.P.L.: Identifying and eliminating malicious devices using DIO and DAO ICMP control messages in RPL-based protocol. Peer-to-Peer Netw. Appl. 16, 2380\u20132398 (2023). https:\/\/doi.org\/10.1007\/s12083-023-01539-0","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"1","key":"9908_CR43","doi-asserted-by":"publisher","first-page":"739","DOI":"10.12785\/ijcds\/160154","volume":"16","author":"L Gnanaprasanambikai","year":"2024","unstructured":"Gnanaprasanambikai, L.: K-means clustering-based Trust (KmeansT) evaluation mechanism for detecting blackhole attacks in IoT environment. Int. J. Comput. Digit. Syst. 16(1), 739\u2013751 (2024). https:\/\/doi.org\/10.12785\/ijcds\/160154","journal-title":"Int. J. Comput. Digit. Syst."},{"issue":"2","key":"9908_CR44","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/TNSM.2017.2705290","volume":"14","author":"A Mayzaud","year":"2017","unstructured":"Mayzaud, A., Badonnel, R., Chrisment, I.: A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE Trans. Netw. Serv. Manage. 14(2), 472\u2013486 (2017). https:\/\/doi.org\/10.1109\/TNSM.2017.2705290","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"9908_CR45","doi-asserted-by":"publisher","unstructured":"Mayzaud, A., Badonnel, R., Chrisment, I.: Detecting version number attacks in RPL-based networks using a distributed monitoring architecture. In 2016 12th international conference on network and service management (CNSM) (pp. 127\u2013135). IEEE. (2016)., October https:\/\/doi.org\/10.1109\/CNSM.2016.7818408","DOI":"10.1109\/CNSM.2016.7818408"},{"issue":"5","key":"9908_CR46","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1002\/nem.1898","volume":"25","author":"A Mayzaud","year":"2015","unstructured":"Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., Sch\u00f6nw\u00e4lder, J.: Mitigation of topological inconsistency attacks in RPL-based low\u2010power lossy networks. Int. J. Network Manage. 25(5), 320\u2013339 (2015). https:\/\/doi.org\/10.1002\/nem.1898","journal-title":"Int. J. Network Manage"},{"key":"9908_CR47","doi-asserted-by":"publisher","unstructured":"Ibibo, J.T.: October. A Bibliometric Analysis and Comprehensive Overview of Security Attacks Against RPL in IoT Networks. In International Conference on Safety and Security in IoT (pp. 45\u201359). Cham: Springer Nature Switzerland. (2023). https:\/\/doi.org\/10.1007\/978-3-031-53028-9_4","DOI":"10.1007\/978-3-031-53028-9_4"},{"key":"9908_CR48","doi-asserted-by":"publisher","unstructured":"Khan, M.A., Rais, R.N.B., Khalid, O., Ahmad, S.: Trust-based optimized Reporting for Detection and Prevention of Black Hole Attacks in low-power and Lossy Green IoT Networks. Sensors. 24(6) (2024). https:\/\/doi.org\/10.3390\/s24061775","DOI":"10.3390\/s24061775"},{"key":"9908_CR49","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.comcom.2022.04.003","volume":"189","author":"DK Sharma","year":"2022","unstructured":"Sharma, D.K., Dhurandher, S.K., Kumaram, S., Gupta, K.D., Sharma, P.K.: Mitigation of black hole attacks in 6LoWPAN RPL-based Wireless sensor network for cyber physical systems. Comput. Commun. 189, 182\u2013192 (2022). https:\/\/doi.org\/10.1016\/j.comcom.2022.04.003","journal-title":"Comput. Commun."},{"key":"9908_CR50","unstructured":"References 33 and 34 are cited before the equation 1 (, it is calculated as follows: [33-34])"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-09908-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-025-09908-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-09908-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T11:49:13Z","timestamp":1744976953000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-025-09908-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,21]]},"references-count":50,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["9908"],"URL":"https:\/\/doi.org\/10.1007\/s10922-025-09908-1","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,21]]},"assertion":[{"value":"30 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"34"}}