{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T09:38:11Z","timestamp":1777109891381,"version":"3.51.4"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T00:00:00Z","timestamp":1609891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T00:00:00Z","timestamp":1609891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11280-020-00855-2","type":"journal-article","created":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T23:08:32Z","timestamp":1609974512000},"page":"971-1001","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":92,"title":["DDoS attacks in IoT networks: a comprehensive systematic literature review"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4256-7799","authenticated-orcid":false,"given":"Yahya","family":"Al-Hadhrami","sequence":"first","affiliation":[]},{"given":"Farookh Khadeer","family":"Hussain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,6]]},"reference":[{"issue":"1","key":"855_CR1","doi-asserted-by":"publisher","first-page":"65","DOI":"10.13052\/jcsm2245-1439.414","volume":"4","author":"M Abomhara","year":"2015","unstructured":"Abomhara, M., et al.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber. Secur. Mob. 4(1), 65\u201388 (2015)","journal-title":"J. Cyber. Secur. Mob."},{"issue":"18","key":"855_CR2","doi-asserted-by":"publisher","first-page":"5143","DOI":"10.1002\/sec.1684","volume":"9","author":"F Ahmed","year":"2016","unstructured":"Ahmed, F., Ko, Y-B: Mitigation of black hole attacks in routing protocol for low power and lossy networks. Secur. Commun. Netw. 9(18), 5143\u20135154 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"855_CR3","doi-asserted-by":"crossref","unstructured":"Airehrour, D., Gutierrez, J., Ray, S.K.: A lightweight trust design for iot routing. In: 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech), pp. 552\u2013557. IEEE (2016)","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.105"},{"issue":"4","key":"855_CR4","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials 17(4), 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"855_CR5","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","volume":"88","author":"FA Alaba","year":"2017","unstructured":"Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet of things security: A survey. J. Netw. Comput. Appl. 88, 10\u201328 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"855_CR6","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1016\/j.procs.2016.03.092","volume":"79","author":"P Amish","year":"2016","unstructured":"Amish, P., Vaghela, V.B.: Detection and prevention of wormhole attack in wireless sensor network using aomdv protocol. Procedia Comput. Sci. 79, 700\u2013707 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"855_CR7","doi-asserted-by":"crossref","unstructured":"Bhattasali, T., Chaki, R., Sanyal, S.: Sleep deprivation attack detection in wireless sensor network. arXiv:1203.0231 (2012)","DOI":"10.5120\/5056-7374"},{"key":"855_CR8","unstructured":"Borgohain, T., Kumar, U., Sanyal, S.: Survey of security and privacy issues of internet of things. arXiv:1501.02211 (2015)"},{"key":"855_CR9","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.comcom.2016.12.001","volume":"98","author":"H Bostani","year":"2017","unstructured":"Bostani, H., Sheikhan, M.: Hybrid of anomaly-based and specification-based ids for internet of things using unsupervised opf based on mapreduce approach. Comput. Commun. 98, 52\u201371 (2017)","journal-title":"Comput. Commun."},{"key":"855_CR10","doi-asserted-by":"crossref","unstructured":"Brown, C., Cowperthwaite, A., Hijazi, A., Somayaji, A.: Analysis of the 1999 darpa\/lincoln laboratory ids evaluation data with netadhict. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20137. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356522"},{"key":"855_CR11","doi-asserted-by":"crossref","unstructured":"Cervantes, C., Poplade, D., Nogueira, M., Santos, A.: Detection of sinkhole attacks for supporting secure routing on 6lowpan for internet of things. In: 2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp. 606\u2013611. IEEE (2015)","DOI":"10.1109\/INM.2015.7140344"},{"key":"855_CR12","doi-asserted-by":"crossref","unstructured":"Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for iot security based on learning techniques. IEEE Communications Surveys & Tutorials (2019)","DOI":"10.1109\/COMST.2019.2896380"},{"issue":"6","key":"855_CR13","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1109\/TDSC.2015.2420552","volume":"13","author":"R Chen","year":"2015","unstructured":"Chen, R., Bao, F., Guo, J.: Trust-based service management for social internet of things systems. IEEE Trans. Depend. Sec. Comput. 13(6), 684\u2013696 (2015)","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"key":"855_CR14","doi-asserted-by":"crossref","unstructured":"Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of things security and forensics: Challenges and opportunities. Elsevier (2018)","DOI":"10.1016\/j.future.2017.07.060"},{"key":"855_CR15","doi-asserted-by":"crossref","unstructured":"Creech, G., Hu, J.: Generation of a new ids test dataset: Time to retire the kdd collection. In: 2013 IEEE Wireless Communications and Networking Conference (WCNC), pp. 4487\u20134492. IEEE (2013)","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"855_CR16","doi-asserted-by":"crossref","unstructured":"Dvir, A., Buttyan, L., et al.: Vera-version number and rank authentication in rpl. In: 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, pp. 709\u2013714. IEEE (2011)","DOI":"10.1109\/MASS.2011.76"},{"key":"855_CR17","doi-asserted-by":"crossref","unstructured":"Gara, F., Saad, L.B., Ayed, R.B.: An intrusion detection system for selective forwarding attack in ipv6-based mobile wsns. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 276\u2013281. IEEE (2017)","DOI":"10.1109\/IWCMC.2017.7986299"},{"key":"855_CR18","doi-asserted-by":"crossref","unstructured":"Glissa, G., Meddeb, A.: 6lowpan multi-layered security protocol based on ieee 802.15. 4 security features. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 264\u2013269. IEEE (2017)","DOI":"10.1109\/IWCMC.2017.7986297"},{"key":"855_CR19","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.adhoc.2018.01.013","volume":"82","author":"G Glissa","year":"2019","unstructured":"Glissa, G., Meddeb, A.: 6lowpsec: An end-to-end security protocol for 6lowpan. Ad Hoc Netw. 82, 100\u2013112 (2019)","journal-title":"Ad Hoc Netw."},{"issue":"7","key":"855_CR20","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (iot): A vision, architectural elements, and future directions. Fut. Gener. Comput. Syst. 29(7), 1645\u20131660 (2013)","journal-title":"Fut. Gener. Comput. Syst."},{"key":"855_CR21","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","volume":"148","author":"WH Hassan","year":"2019","unstructured":"Hassan, W.H., et al.: Current research on internet of things (iot) security: A survey. Comput. Netw. 148, 283\u2013294 (2019)","journal-title":"Comput. Netw."},{"key":"855_CR22","doi-asserted-by":"crossref","unstructured":"Heurtefeux, K., Erdene-Ochir, O., Mohsin, N., Menouar, H.: Enhancing rpl resilience against routing layer insider attacks. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, pp. 802\u2013807. IEEE (2015)","DOI":"10.1109\/AINA.2015.271"},{"issue":"5","key":"855_CR23","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MWC.2016.7721741","volume":"23","author":"MS Hossain","year":"2016","unstructured":"Hossain, M.S., Muhammad, G., Rahman, S.M.M., Abdul, W., Alelaiwi, A., Alamri, A.: Toward end-to-end biomet rics-based security for iot infrastructure. IEEE Wirel. Commun. 23(5), 44\u201351 (2016)","journal-title":"IEEE Wirel. Commun."},{"key":"855_CR24","doi-asserted-by":"crossref","unstructured":"Hossain, M., Karim, Y., Hasan, R.: Secupan: A security scheme to mitigate fragmentation-based network attacks in 6lowpan. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, pp. 307\u2013318. ACM (2018)","DOI":"10.1145\/3176258.3176326"},{"key":"855_CR25","doi-asserted-by":"crossref","unstructured":"Hota, C., Shrivastava, R.K., Shipra, S.: Tamper-resistant code using optimal rop gadgets for iot devices. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 570\u2013575. IEEE (2017)","DOI":"10.1109\/IWCMC.2017.7986348"},{"key":"855_CR26","doi-asserted-by":"crossref","unstructured":"Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., Wehrle, K.: 6lowpan fragmentation attacks and mitigation mechanisms. In: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, pp. 55\u201366. ACM (2013)","DOI":"10.1145\/2462096.2462107"},{"key":"855_CR27","unstructured":"Ioulianou, P., Vasilakis, V., Moscholios, I., Logothetis, M.: A signature-based intrusion detection system for the internet of things. Information and Communication Technology Form (2018)"},{"key":"855_CR28","unstructured":"Jan, M.A., Khan, M.: Denial of service attacks and their countermeasures in wsn. IRACST\u2013Int. J. Comput. Netw. Wirel. Commun. (IJCNWC) 3 (2013)"},{"key":"855_CR29","doi-asserted-by":"publisher","unstructured":"J\u00f8sang, A.: A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 9(3), 279\u2013311 (June 2001). https:\/\/doi.org\/10.1142\/S0218488501000831","DOI":"10.1142\/S0218488501000831"},{"key":"855_CR30","doi-asserted-by":"crossref","unstructured":"Kasinathan, P., Pastrone, C., Spirito, M.A., Vinkovits, M.: Denial-of-service detection in 6lowpan based internet of things. In: 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob), pp. 600\u2013607. IEEE (2013)","DOI":"10.1109\/WiMOB.2013.6673419"},{"key":"855_CR31","doi-asserted-by":"crossref","unstructured":"Khan, Z.A., Herrmann, P.: A trust based distributed intrusion detection mechanism for internet of things. In: 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), pp. 1169\u20131176. IEEE (2017)","DOI":"10.1109\/AINA.2017.161"},{"issue":"7","key":"855_CR32","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: Ddos in the iot: Mirai and other botnets. Computer 50(7), 80\u201384 (2017)","journal-title":"Computer"},{"key":"855_CR33","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","volume":"141","author":"DE Kouicem","year":"2018","unstructured":"Kouicem, D.E., Bouabdallah, A., Lakhlef, H.: Internet of things security: A top-down survey. Comput. Netw. 141, 199\u2013221 (2018)","journal-title":"Comput. Netw."},{"key":"855_CR34","doi-asserted-by":"crossref","unstructured":"La, V.H., Fuentes, R., Cavalli, A.R.: A novel monitoring solution for 6lowpan-based wireless sensor networks. In: 2016 22nd Asia-Pacific Conference on Communications (APCC), pp. 230\u2013237. IEEE (2016)","DOI":"10.1109\/APCC.2016.7581493"},{"key":"855_CR35","doi-asserted-by":"crossref","unstructured":"Le, A., Loo, J., Chai, K., Aiash, M.: A specification-based ids for detecting attacks on rpl-based network topology. Information 7(2), 25 (2016)","DOI":"10.3390\/info7020025"},{"issue":"4","key":"855_CR36","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","volume":"58","author":"I Lee","year":"2015","unstructured":"Lee, I., Lee, K.: The internet of things (iot): Applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431\u2013440 (2015)","journal-title":"Bus. Horiz."},{"issue":"5","key":"855_CR37","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125\u20131142 (2017)","journal-title":"IEEE Internet Things J."},{"key":"855_CR38","doi-asserted-by":"crossref","unstructured":"Lu, Y., DaXu, L.: Internet of things (iot) cybersecurity research: a review of current research topics. IEEE Internet Things J. (2018)","DOI":"10.1109\/JIOT.2018.2869847"},{"key":"855_CR39","doi-asserted-by":"crossref","unstructured":"Lyu, M., Sherratt, D., Sivanathan, A., Gharakheili, H.H., Radford, A., Sivaraman, V.: Quantifying the reflective ddos attack capability of household iot devices. In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 46\u201351. ACM (2017)","DOI":"10.1145\/3098243.3098264"},{"key":"855_CR40","doi-asserted-by":"crossref","unstructured":"Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (iot) security: Current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336\u2013341. IEEE (2015)","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"855_CR41","doi-asserted-by":"crossref","unstructured":"Medjek, F., Tandjaoui, D., Romdhani, I., Djedjig, N.: A trust-based intrusion detection system for mobile rpl based networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 735\u2013742. IEEE (2017)","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.113"},{"key":"855_CR42","doi-asserted-by":"crossref","unstructured":"Midi, D., Rullo, A., Mudgerikar, A., Bertino, E.: Kalis\u2014a system for knowledge-driven adaptable intrusion detection for the internet of things. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 656\u2013666. IEEE (2017)","DOI":"10.1109\/ICDCS.2017.104"},{"issue":"4","key":"855_CR43","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","volume":"5","author":"A Mosenia","year":"2017","unstructured":"Mosenia, A., Jha, N.K.: A comprehensive study of security of internet-of-things. IEEE Trans. Emerg. Top. Comput. 5(4), 586\u2013602 (2017)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"855_CR44","doi-asserted-by":"crossref","unstructured":"Namvar, N., Saad, W., Bahadori, N., Kelley, B.: Jamming in the internet of things: A game-theoretic perspective. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/GLOCOM.2016.7841922"},{"key":"855_CR45","doi-asserted-by":"crossref","unstructured":"Owezarski, P.: A database of anomalous traffic for assessing profile based ids. In: International Workshop on Traffic Monitoring and Analysis, pp. 59\u201372. Springer (2010)","DOI":"10.1007\/978-3-642-12365-8_5"},{"key":"855_CR46","doi-asserted-by":"crossref","unstructured":"Perrey, H., Landsmann, M., Ugus, O., Schmidt, T.C., W\u00e4hlisch, M.: Trail: Topology authentication in rpl. arXiv:1312.0984 (2013)","DOI":"10.1109\/INFCOMW.2013.6970745"},{"key":"855_CR47","first-page":"1","volume":"9","author":"RL Pihl","year":"1998","unstructured":"Pihl, R.L.: The sequential probability ratio test. History 9, 1 (1998)","journal-title":"History"},{"key":"855_CR48","doi-asserted-by":"crossref","unstructured":"Pongle, P., Chavan, G.: A survey: Attacks on rpl and 6lowpan in iot. In: 2015 International Conference on Pervasive Computing (ICPC), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/PERVASIVE.2015.7087034"},{"issue":"1","key":"855_CR49","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/JSYST.2016.2535730","volume":"12","author":"C Pu","year":"2016","unstructured":"Pu, C., Lim, S.: A light-weight countermeasure to forwarding misbehavior in wireless sensor networks: design, analysis, and evaluation. IEEE Syst. J. 12(1), 834\u2013842 (2016)","journal-title":"IEEE Syst. J."},{"issue":"8","key":"855_CR50","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"Raza, S., Wallgren, L., Voigt, T.: Svelte: Real-time intrusion detection in the internet of things. Ad hoc Netw. 11(8), 2661\u20132674 (2013)","journal-title":"Ad hoc Netw."},{"key":"855_CR51","unstructured":"Rivera, J., vander Meulen, R.: Gartner says the internet of things will transform the data center. Retrieved August 5, 2014 (2014)"},{"key":"855_CR52","doi-asserted-by":"crossref","unstructured":"Sehgal, A., Mayzaud, A., Badonnel, R., Chrisment, I., Sch\u00f6nw\u00e4lder, J.: Addressing dodag inconsistency attacks in rpl networks. In: 2014 Global Information Infrastructure and Networking Symposium (GIIS), pp. 1\u20138. IEEE (2014)","DOI":"10.1109\/GIIS.2014.6934253"},{"issue":"2","key":"855_CR53","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.dcan.2017.04.003","volume":"4","author":"AR Sfar","year":"2018","unstructured":"Sfar, A.R., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in the internet of things. Digit. Commun. Netw. 4(2), 118\u2013137 (2018)","journal-title":"Digit. Commun. Netw."},{"key":"855_CR54","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.future.2018.01.059","volume":"83","author":"K Sha","year":"2018","unstructured":"Sha, K., Wei, W., Yang, T.A., Wang, Z., Shi, W.: On security challenges and open issues in internet of things. Futur. Gener. Comput. Syst. 83, 326\u2013337 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"855_CR55","unstructured":"Sherasiya, T., Upadhyay, H.: Intrusion detection system for internet of things. Int. J. Adv. Res. Innov. Ideas Educ.(IJARIIE) 2(3) (2016)"},{"key":"855_CR56","doi-asserted-by":"crossref","unstructured":"Shrivastava, R., Hota, C., Shrivastava, P.: Protection against code exploitation using rop and check-summing in iot environment. In: 2017 5th International Conference on Information and Communication Technology (ICoIC7), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ICoICT.2017.8074641"},{"key":"855_CR57","doi-asserted-by":"crossref","unstructured":"Sonar, K., Upadhyay, H.: An approach to secure internet of things against ddos. Proceedings of International Conference on ICT for Sustainable Development, pp. 367\u2013376. Springer (2016)","DOI":"10.1007\/978-981-10-0135-2_36"},{"issue":"4","key":"855_CR58","first-page":"16","volume":"4","author":"R Stephen","year":"2017","unstructured":"Stephen, R., Arockiam, L.: Intrusion detection system to detect sinkhole attack on rpl protocol in internet of things. Int. J. Electr. Electron. Comput. Sci. 4(4), 16\u201320 (2017)","journal-title":"Int. J. Electr. Electron. Comput. Sci."},{"key":"855_CR59","unstructured":"Stolfo, S.J., et al.: Kdd cup 1999 dataset. UCI KDD repository. http:\/\/kdd.ics.uci.edu (1999)"},{"issue":"4","key":"855_CR60","doi-asserted-by":"publisher","first-page":"961","DOI":"10.3390\/s18040961","volume":"18","author":"Y Sung","year":"2018","unstructured":"Sung, Y., Lee, S., Lee, M.: A multi-hop clustering mechanism for scalable iot networks. Sensors 18(4), 961 (2018)","journal-title":"Sensors"},{"key":"855_CR61","doi-asserted-by":"crossref","unstructured":"Surendar, M., Umamakeswari, A.: Indres: An intrusion detection and response system for internet of things with 6lowpan. In: 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 1903\u20131908. IEEE (2016)","DOI":"10.1109\/WiSPNET.2016.7566473"},{"key":"855_CR62","doi-asserted-by":"publisher","first-page":"5766","DOI":"10.1109\/ACCESS.2018.2793280","volume":"6","author":"X Tang","year":"2018","unstructured":"Tang, X., Ren, P., Han, Z.: Jamming mitigation via hierarchical security game for iot communications. IEEE Access 6, 5766\u20135779 (2018)","journal-title":"IEEE Access"},{"key":"855_CR63","unstructured":"Tewari, A., Gupta, B.B.: Security, privacy and trust of different layers in internet-of-things (iots) framework. Futur. Gener. Comput. Syst. (2018)"},{"issue":"8","key":"855_CR64","doi-asserted-by":"publisher","first-page":"794326","DOI":"10.1155\/2013\/794326","volume":"9","author":"L Wallgren","year":"2013","unstructured":"Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the rpl-based internet of things. Int. J. Distrib. Sens. Netw. 9(8), 794326 (2013)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"2","key":"855_CR65","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2006.315852","volume":"8","author":"Y Wang","year":"2006","unstructured":"Wang, Y, Attebury, G, Ramamurthy, B: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8(2), 2\u201323 (2006). https:\/\/doi.org\/10.1109\/COMST.2006.315852","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"4","key":"855_CR66","doi-asserted-by":"publisher","first-page":"e3183","DOI":"10.1002\/ett.3183","volume":"29","author":"Q Yaseen","year":"2018","unstructured":"Yaseen, Q., Albalas, F., Jararwah, Y., Al-Ayyoub, M.: Leveraging fog computing and software defined systems for selective forwarding attacks detection in mobile wireless sensor networks. Trans. Emerg. Telecommun. Technol. 29 (4), e3183 (2018)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"855_CR67","doi-asserted-by":"crossref","unstructured":"Yaseen, Q., AlBalas, F., Jararweh, Y., Al-Ayyoub, M.: A fog computing based system for selective forwarding detection in mobile wireless sensor networks. In: 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS* W), pp. 256\u2013262. IEEE (2016)","DOI":"10.1109\/FAS-W.2016.60"},{"key":"855_CR68","unstructured":"Zheng, L., Zhang, H., Han, W., Zhou, X., He, J., Zhang, Z., Gu, Y., Wang, J., et al.: Technologies, applications, and governance in the internet of things. Internet of things-Global technological and societal trends. From smart environments and spaces to green ICT (2011)"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-020-00855-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11280-020-00855-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-020-00855-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T17:13:22Z","timestamp":1621617202000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11280-020-00855-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,6]]},"references-count":68,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["855"],"URL":"https:\/\/doi.org\/10.1007\/s11280-020-00855-2","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,6]]},"assertion":[{"value":"10 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}