{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:41:28Z","timestamp":1740148888126,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,10,29]],"date-time":"2021-10-29T00:00:00Z","timestamp":1635465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,29]],"date-time":"2021-10-29T00:00:00Z","timestamp":1635465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s12083-021-01255-7","type":"journal-article","created":{"date-parts":[[2021,10,29]],"date-time":"2021-10-29T05:02:27Z","timestamp":1635483747000},"page":"484-502","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An autonomous intrusion detection system for the RPL protocol"],"prefix":"10.1007","volume":"15","author":[{"given":"Mohammad","family":"Shirafkan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4856-9119","authenticated-orcid":false,"given":"Ali","family":"Shahidienjad","sequence":"additional","affiliation":[]},{"given":"Mostafa","family":"Ghobaei-Arani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,29]]},"reference":[{"key":"1255_CR1","doi-asserted-by":"crossref","unstructured":"Paul PV, Saraswathi R (2017) The Internet of Things\u2014A comprehensive survey. In\u00a0Computation of Power, Energy Information and Communication (ICCPEIC), 2017 International Conference on\u00a0(pp. 421\u2013426). IEEE\u200f","DOI":"10.1109\/ICCPEIC.2017.8290405"},{"issue":"5","key":"1255_CR2","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on Internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125\u20131142","journal-title":"IEEE Internet Things J"},{"issue":"9","key":"1255_CR3","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1002\/dac.2417","volume":"25","author":"F Xia","year":"2012","unstructured":"Xia F, Yang LT, Wang L, Vinel A (2012) Internet of things. Int J Commun Syst 25(9):1101\u20131102","journal-title":"Int J Commun Syst"},{"key":"1255_CR4","unstructured":"Winter T, Thubert P, Brandt A, Hui J, Kelsey R, Levis P, Pister K, Struik R, Vasseur J, Alexander R (2012) RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks, RFC 6550 (Proposed Standard). Internet Engineering Task Force"},{"key":"1255_CR5","doi-asserted-by":"crossref","unstructured":"Zhang L, Feng G, Qin, S (2015) Intrusion detection system for RPL from routing choice intrusion. In\u00a02015 IEEE International Conference on Communication Workshop (ICCW)\u00a0(pp. 2652\u20132658). IEEE","DOI":"10.1109\/ICCW.2015.7247579"},{"key":"1255_CR6","doi-asserted-by":"crossref","unstructured":"Patel HB, Jinwala DC, Patel DR (2016) Baseline intrusion detection framework for 6lowpan devices. In\u00a0Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services\u00a0(pp. 72\u201376). ACM","DOI":"10.1145\/3004010.3004018"},{"key":"1255_CR7","unstructured":"Mayzaud A, Badonnel R, Chrisment I (2016) A Taxonomy of Attacks in RPL-based Internet of Things"},{"key":"1255_CR8","doi-asserted-by":"crossref","unstructured":"Mayzaud A, Badonnel R, Chrisment I (2016) Detecting version number attacks in RPL-based networks using a distributed monitoring architecture. In\u00a02016 12th International Conference on Network and Service Management (CNSM)\u00a0(pp. 127\u2013135). IEEE","DOI":"10.1109\/CNSM.2016.7818408"},{"issue":"2","key":"1255_CR9","doi-asserted-by":"publisher","first-page":"25","DOI":"10.3390\/info7020025","volume":"7","author":"A Le","year":"2016","unstructured":"Le A, Loo J, Chai KK, Aiash M (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information 7(2):25","journal-title":"Information"},{"key":"1255_CR10","doi-asserted-by":"crossref","unstructured":"Glissa G, Rachedi A, Meddeb A (2016) A secure routing protocol based on RPL for Internet of Things. In\u00a02016 IEEE Global Communications Conference (GLOBECOM)\u00a0(pp. 1\u20137). IEEE","DOI":"10.1109\/GLOCOM.2016.7841543"},{"key":"1255_CR11","doi-asserted-by":"crossref","unstructured":"Kamble A, Malemath VS, Patil D (2017) Security attacks and secure routing protocols in RPL-based Internet of Things: Survey. In\u00a02017 International Conference on Emerging Trends & Innovation in ICT (ICEI)\u00a0(pp. 33\u201339). IEEE","DOI":"10.1109\/ETIICT.2017.7977006"},{"issue":"4","key":"1255_CR12","doi-asserted-by":"publisher","first-page":"2502","DOI":"10.1109\/COMST.2017.2751617","volume":"19","author":"HS Kim","year":"2017","unstructured":"Kim HS, Ko J, Culler DE, Paek J (2017) Challenging the IPv6 routing protocol for low-power and lossy networks (RPL): A survey. IEEE Communications Surveys & Tutorials 19(4):2502\u20132525","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1255_CR13","doi-asserted-by":"crossref","unstructured":"Ghaleb B, Al-Dubai A, Ekonomou E, Wadhaj I (2017) A new enhanced RPL based routing for Internet of Things. In\u00a02017 IEEE International Conference on Communications Workshops (ICC Workshops)\u00a0(pp. 595\u2013600). IEEE","DOI":"10.1109\/ICCW.2017.7962723"},{"key":"1255_CR14","doi-asserted-by":"crossref","unstructured":"Shukla P (2017) ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things. In\u00a02017 Intelligent Systems Conference (IntelliSys)\u00a0(pp. 234\u2013240). IEEE","DOI":"10.1109\/IntelliSys.2017.8324298"},{"key":"1255_CR15","doi-asserted-by":"crossref","unstructured":"Shreenivas D, Raza S, Voigt T (2017)\u00a0Intrusion Detection in the RPL-connected 6LoWPAN Networks. In\u00a0Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security\u00a0(pp. 31\u201338). ACM","DOI":"10.1145\/3055245.3055252"},{"key":"1255_CR16","doi-asserted-by":"crossref","unstructured":"Sousa N, Sobral JV, Rodrigues JJ, Rab\u00ealo RA, Solic P (2017) ERAOF: A new RPL protocol thingsive function for Internet of Things applications. In\u00a02017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech)\u00a0(pp. 1\u20135). IEEE","DOI":"10.1109\/SpliTech.2016.7555943"},{"key":"1255_CR17","doi-asserted-by":"crossref","unstructured":"Alvi SA, ul Hassan F, Mian AN (2017) On the energy efficiency and stability of RPL routing protocol. In\u00a02017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)\u00a0(pp. 1927\u20131932). IEEE","DOI":"10.1109\/IWCMC.2017.7986578"},{"issue":"4","key":"1255_CR18","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1109\/TMC.2016.2585107","volume":"16","author":"HS Kim","year":"2016","unstructured":"Kim HS, Kim H, Paek J, Bahk S (2016) Load balancing under heavy traffic in RPL routing protocol for low power and lossy networks. IEEE Trans Mob Comput 16(4):964\u2013979","journal-title":"IEEE Trans Mob Comput"},{"issue":"2","key":"1255_CR19","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1007\/s11277-017-5165-4","volume":"99","author":"M Nikravan","year":"2018","unstructured":"Nikravan M, Movaghar A, Hosseinzadeh M (2018) A lightweight defense approach to mitigate version number and rank attacks in low-power and lossy networks. Wireless Pers Commun 99(2):1035\u20131059","journal-title":"Wireless Pers Commun"},{"key":"1255_CR20","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1016\/j.future.2018.03.021","volume":"93","author":"D Airehrour","year":"2019","unstructured":"Airehrour D, Gutierrez JA, Ray SK (2019) SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Futur Gener Comput Syst 93:860\u2013876","journal-title":"Futur Gener Comput Syst"},{"key":"1255_CR21","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.adhoc.2018.10.022","volume":"85","author":"A Ar\u0131\u015f","year":"2019","unstructured":"Ar\u0131\u015f A, Yal\u00e7\u0131n SB\u00d6, Oktu\u011f SF (2019) New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Netw 85:81\u201391","journal-title":"Ad Hoc Netw"},{"issue":"7","key":"1255_CR22","doi-asserted-by":"publisher","first-page":"3555","DOI":"10.1007\/s11227-018-2700-3","volume":"75","author":"SY Hashemi","year":"2019","unstructured":"Hashemi SY, Aliee FS (2019) Dynamic and comprehensive trust model for IoT and its integration into RPL. J Supercomput 75(7):3555\u20133584","journal-title":"J Supercomput"},{"key":"1255_CR23","doi-asserted-by":"crossref","unstructured":"Bhalaji N, Hariharasudan KS, Aashika K (2019) A Trust-Based Mechanism to Combat Blackhole Attack in RPL Protocol. In\u00a0International Conference on Intelligent Computing and Communication Technologies\u00a0(pp. 457\u2013464). Springer, Singapore","DOI":"10.1007\/978-981-13-8461-5_51"},{"issue":"1","key":"1255_CR24","doi-asserted-by":"publisher","first-page":"30","DOI":"10.4018\/IJITN.2019010103","volume":"11","author":"E Kfoury","year":"2019","unstructured":"Kfoury E, Saab J, Younes P, Achkar R (2019) A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks. International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 11(1):30\u201343","journal-title":"International Journal of Interdisciplinary Telecommunications and Networking (IJITN)"},{"key":"1255_CR25","unstructured":"Tsvetkov T, Klein A (2011) RPL: IPv6 routing protocol for low power and lossy networks.\u00a0Network\u00a059\u200f"},{"key":"1255_CR26","doi-asserted-by":"crossref","unstructured":"Barthel D, Pister K, Dejean N, Vasseur JP, Kim M (2012) Routing metrics used for path calculation in low-power and lossy networks\u200f","DOI":"10.17487\/rfc6551"},{"key":"1255_CR27","doi-asserted-by":"crossref","unstructured":"\u00c7elik M, Dada\u015fer-\u00c7elik F, Dokuz A\u015e (2011) Anomaly detection in temperature data using dbscan algorithm. In 2011 International Symposium on Innovations in Intelligent Systems and Applications (pp. 91\u201395), IEEE","DOI":"10.1109\/INISTA.2011.5946052"},{"issue":"5","key":"1255_CR28","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1002\/nem.1898","volume":"25","author":"A Mayzaud","year":"2015","unstructured":"Mayzaud A, Sehgal A, Badonnel R, Chrisment I, Sch\u00f6nw\u00e4lder J (2015) Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks. Int J Network Manage 25(5):320\u2013339","journal-title":"Int J Network Manage"},{"issue":"4","key":"1255_CR29","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1080\/00031305.1981.10479358","volume":"35","author":"SJ Farlow","year":"1981","unstructured":"Farlow SJ (1981) The GMDH algorithm of Ivakhnenko. Am Stat 35(4):210\u2013215","journal-title":"Am Stat"},{"key":"1255_CR30","doi-asserted-by":"crossref","unstructured":"Aydogan E, Yilmaz S, Sen S, Butun I, Forsstr\u00f6m S, Gidlund M (2019) A Central Intrusion Detection System for RPL-Based Industrial Internet of Things. In\u00a02019 15th IEEE International Workshop on Factory Communication Systems (WFCS)\u00a0(pp. 1\u20135). IEEE","DOI":"10.1109\/WFCS.2019.8758024"},{"issue":"7","key":"1255_CR31","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.1162\/neco.2006.18.7.1527","volume":"18","author":"GE Hinton","year":"2006","unstructured":"Hinton GE, Osindero S, Teh YW (2006) A fast learning algorithm for deep belief nets. Neural Comput 18(7):1527\u20131554","journal-title":"Neural Comput"},{"key":"1255_CR32","unstructured":"Bagheri A, NARIMANZADEH N, Siavash AS, Khoobkar AR (2005) Gmdh type neural networks and their application to the identification of the inverse kinematics equations of robotic manipulators (research note)"},{"issue":"1","key":"1255_CR33","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.datak.2006.01.013","volume":"60","author":"D Birant","year":"2007","unstructured":"Birant D, Kut A (2007) ST-DBSCAN: An algorithm for clustering spatial-temporal data. Data Knowl Eng 60(1):208\u2013221","journal-title":"Data Knowl Eng"},{"issue":"04","key":"1255_CR34","doi-asserted-by":"publisher","first-page":"190","DOI":"10.36548\/jismac.2020.4.002","volume":"2","author":"S Smys","year":"2020","unstructured":"Smys S, Basar A, Wang H (2020) Hybrid intrusion detection system for Internet of Things (IoT). Journal of ISMAC 2(04):190\u2013199","journal-title":"Journal of ISMAC"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01255-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01255-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01255-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:58:36Z","timestamp":1726016316000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01255-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,29]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["1255"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01255-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2021,10,29]]},"assertion":[{"value":"31 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}