{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T07:51:10Z","timestamp":1771833070694,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T00:00:00Z","timestamp":1663200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T00:00:00Z","timestamp":1663200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s11277-022-10022-7","type":"journal-article","created":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T05:02:51Z","timestamp":1663218171000},"page":"1839-1857","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["IoT Routing Attacks Detection Using Machine Learning Algorithms"],"prefix":"10.1007","volume":"128","author":[{"given":"Sana","family":"Rabhi","sequence":"first","affiliation":[]},{"given":"Tarek","family":"Abbes","sequence":"additional","affiliation":[]},{"given":"Faouzi","family":"Zarai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,15]]},"reference":[{"issue":"3","key":"10022_CR1","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/COMST.2015.2388550","volume":"17","author":"J Granjal","year":"2015","unstructured":"Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials., 17(3), 1294\u20131312.","journal-title":"IEEE Communications Surveys & Tutorials."},{"issue":"1","key":"10022_CR2","doi-asserted-by":"publisher","first-page":"30","DOI":"10.4018\/IJITN.2019010103","volume":"11","author":"E Kfoury","year":"2019","unstructured":"Kfoury, E., Saab, J., Younes, P., & Achkar, R. (2019). A self organizing map intrusion detection system for RPL protocol attacks. International Journal of Interdisciplinary Telecommunications and Networking (IJITN)., 11(1), 30\u201343.","journal-title":"International Journal of Interdisciplinary Telecommunications and Networking (IJITN)."},{"key":"10022_CR3","unstructured":"Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., & Levis, P., et\u00a0al. (2012). RPL: IPv6 routing protocol for low-power and lossy networks;"},{"issue":"8","key":"10022_CR4","doi-asserted-by":"publisher","first-page":"794326","DOI":"10.1155\/2013\/794326","volume":"9","author":"L Wallgren","year":"2013","unstructured":"Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based internet of things. International Journal of Distributed Sensor Networks., 9(8), 794326.","journal-title":"International Journal of Distributed Sensor Networks."},{"key":"10022_CR5","doi-asserted-by":"crossref","unstructured":"Pongle, P., Chavan, G. A., & survey: Attacks on RPL and 6LoWPAN in IoT. In,. (2015). International conference on pervasive computing (ICPC). IEEE, 2015, 1\u20136.","DOI":"10.1109\/PERVASIVE.2015.7087034"},{"key":"10022_CR6","volume-title":"Computer security threat monitoring and surveillance","author":"JP Anderson","year":"1980","unstructured":"Anderson, J. P. (1980). Computer security threat monitoring and surveillance. James P Anderson Company: Technical Report."},{"key":"10022_CR7","doi-asserted-by":"crossref","unstructured":"Heberlein, LT., Dias, GV., Levitt, KN., Mukherjee, B., Wood, J., & Wolber, D. (1989). A network security monitor. Lawrence Livermore National Lab., CA (USA); California Univ., Davis, CA (USA\u00a0...;","DOI":"10.2172\/6223037"},{"key":"10022_CR8","doi-asserted-by":"crossref","unstructured":"Gupta, A., Pandey, OJ., Shukla, M., Dadhich, A., Mathur, S., & Ingle, A. (2013). Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research. IEEE; p. 1\u20137.","DOI":"10.1109\/ICCIC.2013.6724156"},{"issue":"5","key":"10022_CR9","doi-asserted-by":"publisher","first-page":"227","DOI":"10.14445\/22312803\/IJCTT-V12P146","volume":"12","author":"P Kavitha","year":"2014","unstructured":"Kavitha, P., & Usha, M. (2014). Cluster based anomaly detection in wireless LAN. International Journal of Computer Trends and Technology (IJCTT)., 12(5), 227\u2013230.","journal-title":"International Journal of Computer Trends and Technology (IJCTT)."},{"issue":"1","key":"10022_CR10","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2991\/ijcis.2018.25905181","volume":"12","author":"FY Yavuz","year":"2018","unstructured":"Yavuz, F. Y., Devrim, \u00dc., & Ensar, G. (2018). Deep learning for detection of routing attacks in the internet of things. International Journal of Computational Intelligence Systems., 12(1), 39.","journal-title":"International Journal of Computational Intelligence Systems."},{"key":"10022_CR11","doi-asserted-by":"crossref","unstructured":"Yuan, Y., Li, S., Zhang, X., & Sun, J. (2018). A comparative analysis of svm, naive bayes and gbdt for data faults detection in wsns. In: 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE; pp. 394\u2013399.","DOI":"10.1109\/QRS-C.2018.00075"},{"key":"10022_CR12","doi-asserted-by":"publisher","first-page":"16623","DOI":"10.1109\/ACCESS.2018.2798626","volume":"6","author":"MN Napiah","year":"2018","unstructured":"Napiah, M. N., Idris, M. Y. I. B., Ramli, R., & Ahmedy, I. (2018). Compression header analyzer intrusion detection system (CHA-IDS) for 6LoWPAN communication protocol. IEEE Access., 6, 16623\u201316638.","journal-title":"IEEE Access."},{"key":"10022_CR13","unstructured":"Ioulianou, P., Vasilakis, V., Moscholios, I., & Logothetis, M. (2018) A signature-based intrusion detection system for the internet of things. Information and Communication Technology Form. ."},{"issue":"7","key":"10022_CR14","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/s12243-018-0645-4","volume":"73","author":"U Shafique","year":"2018","unstructured":"Shafique, U., Khan, A., Rehman, A., Bashir, F., & Alam, M. (2018). Detection of rank attack in routing protocol for Low Power and Lossy Networks. Annals of Telecommunications., 73(7), 429\u2013438.","journal-title":"Annals of Telecommunications."},{"key":"10022_CR15","doi-asserted-by":"crossref","unstructured":"Verma, A., Ranga, V., & ELNIDS: Ensemble learning based network intrusion detection system for RPL based Internet of Things. In,. (2019). 4th International conference on Internet of Things: Smart innovation and usages (IoT-SIU). IEEE, 2019, 1\u20136.","DOI":"10.1109\/IoT-SIU.2019.8777504"},{"issue":"1","key":"10022_CR16","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s12065-019-00291-w","volume":"14","author":"V Kumar","year":"2021","unstructured":"Kumar, V., Das, A. K., & Sinha, D. (2021). UIDS: a unified intrusion detection system for IoT environment. Evolutionary intelligence., 14(1), 47\u201359.","journal-title":"Evolutionary intelligence."},{"key":"10022_CR17","doi-asserted-by":"publisher","first-page":"102662","DOI":"10.1016\/j.jnca.2020.102662","volume":"163","author":"GDLT Parra","year":"2020","unstructured":"Parra, G. D. L. T., Rad, P., Choo, K. K. R., & Beebe, N. (2020). Detecting Internet of Things attacks using distributed deep learning. Journal of Network and Computer Applications., 163, 102662.","journal-title":"Journal of Network and Computer Applications."},{"key":"10022_CR18","doi-asserted-by":"publisher","first-page":"103906","DOI":"10.1109\/ACCESS.2021.3094024","volume":"9","author":"I Ullah","year":"2021","unstructured":"Ullah, I., & Mahmoud, Q. H. (2021). Design and development of a deep learning-based model for anomaly detection in IoT networks. IEEE Access., 9, 103906\u2013103926.","journal-title":"IEEE Access."},{"key":"10022_CR19","doi-asserted-by":"publisher","first-page":"42450","DOI":"10.1109\/ACCESS.2019.2907965","volume":"7","author":"SU Jan","year":"2019","unstructured":"Jan, S. U., Ahmed, S., Shakhov, V., & Koo, I. (2019). Toward a lightweight intrusion detection system for the internet of things. IEEE Access., 7, 42450\u201342471.","journal-title":"IEEE Access."},{"issue":"1","key":"10022_CR20","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., & Witten, I. H. (2009). The WEKA data mining software: an update. ACM SIGKDD explorations newsletter., 11(1), 10\u201318.","journal-title":"ACM SIGKDD explorations newsletter."},{"issue":"6","key":"10022_CR21","doi-asserted-by":"publisher","first-page":"2178","DOI":"10.1109\/18.720536","volume":"44","author":"SR Kulkarni","year":"1998","unstructured":"Kulkarni, S. R., Lugosi, G., & Venkatesh, S. S. (1998). Learning pattern classification-a survey. IEEE Transactions on Information Theory., 44(6), 2178\u20132206.","journal-title":"IEEE Transactions on Information Theory."},{"issue":"3","key":"10022_CR22","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/21.97458","volume":"21","author":"SR Safavian","year":"1991","unstructured":"Safavian, S. R., & Landgrebe, D. (1991). A survey of decision tree classifier methodology. IEEE transactions on systems, man, and cybernetics., 21(3), 660\u2013674.","journal-title":"IEEE transactions on systems, man, and cybernetics."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-10022-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-022-10022-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-10022-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T16:37:40Z","timestamp":1675096660000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-022-10022-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,15]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["10022"],"URL":"https:\/\/doi.org\/10.1007\/s11277-022-10022-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,15]]},"assertion":[{"value":"29 August 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest\/Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code Availability"}}]}}