{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:12:28Z","timestamp":1760746348973,"version":"build-2065373602"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12083-025-02114-5","type":"journal-article","created":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T05:28:52Z","timestamp":1757741332000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Impact assessment of sinkhole attack in IoT networks: a mathematical modeling approach"],"prefix":"10.1007","volume":"18","author":[{"given":"Nidhi","family":"Sinha","sequence":"first","affiliation":[]},{"given":"Alekha Kumar","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,13]]},"reference":[{"key":"2114_CR1","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.comnet.2018.07.017","volume":"144","author":"A \u010colakovi\u0107","year":"2018","unstructured":"\u010colakovi\u0107 A, Had\u017eiali\u0107 M (2018) Internet of Things (IoT): a review of enabling technologies, challenges, and open research issues. Comput Netw 144:17\u201339. https:\/\/doi.org\/10.1016\/j.comnet.2018.07.017","journal-title":"Comput Netw"},{"issue":"3","key":"2114_CR2","doi-asserted-by":"publisher","first-page":"2702","DOI":"10.1109\/COMST.2019.2910750","volume":"21","author":"N Neshenko","year":"2019","unstructured":"Neshenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani N (2019) Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Commun Surv Tutor 21(3):2702\u20132733. https:\/\/doi.org\/10.1109\/COMST.2019.2910750","journal-title":"IEEE Commun Surv Tutor"},{"issue":"21","key":"2114_CR3","doi-asserted-by":"publisher","first-page":"34567","DOI":"10.1109\/JIOT.2024.3372518","volume":"11","author":"P Sun","year":"2024","unstructured":"Sun P, Shen S, Wan Y, Wu Z, Fang Z, Gao X-Z (2024) A survey of IoT privacy security: architecture, technology, challenges, and trends. IEEE Internet Things J 11(21):34567\u201334591. https:\/\/doi.org\/10.1109\/JIOT.2024.3372518","journal-title":"IEEE Internet Things J"},{"key":"2114_CR4","doi-asserted-by":"publisher","first-page":"5302","DOI":"10.1109\/TIFS.2023.3307956","volume":"18","author":"S Shen","year":"2023","unstructured":"Shen S, Xie L, Zhang Y, Wu G, Zhang H, Yu S (2023) Joint differential game and double deep q-networks for suppressing malware spread in industrial internet of things. IEEE Trans Inf Forens Secur 18:5302\u20135315. https:\/\/doi.org\/10.1109\/TIFS.2023.3307956","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"2114_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2025.3542104","author":"S Shen","year":"2025","unstructured":"Shen S, Cai C, Shen Y, Wu X, Ke W, Yu S (2025) Joint mean-field game and multiagent asynchronous advantage actor-critic for edge intelligence-based iot malware propagation defense. IEEE Trans Depend Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2025.3542104","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"2114_CR6","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.adhoc.2018.01.013","volume":"82","author":"G Glissa","year":"2019","unstructured":"Glissa G, Meddeb A (2019) 6LowPSec: an end-to-end security protocol for 6LoWPAN. Ad Hoc Netw 82:100\u2013112. https:\/\/doi.org\/10.1016\/j.adhoc.2018.01.013","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"2114_CR7","doi-asserted-by":"publisher","first-page":"1372","DOI":"10.1109\/COMST.2020.2976075","volume":"22","author":"SA Hamad","year":"2020","unstructured":"Hamad SA, Sheng QZ, Zhang WE, Nepal S (2020) Realizing an internet of secure things: a survey on issues and enabling technologies. IEEE Commun Surv Tutor 22(2):1372\u20131392","journal-title":"IEEE Commun Surv Tutor"},{"key":"2114_CR8","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.sysarc.2018.07.005","volume":"89","author":"L Zhang","year":"2018","unstructured":"Zhang L, Wang X, Jiang Y, Yang M, Mak T, Singh AK (2018) Effectiveness of ht-assisted sinkhole and blackhole denial of service attacks targeting mesh networks-on-chip. J Syst Archit 89:84\u201394","journal-title":"J Syst Archit"},{"key":"2114_CR9","doi-asserted-by":"publisher","first-page":"39295","DOI":"10.1109\/ACCESS.2023.3268064","volume":"11","author":"J Cook","year":"2023","unstructured":"Cook J, Rehman SU, Khan MA (2023) Security and privacy for low power iot devices on 5g and beyond networks: challenges and future directions. IEEE Access 11:39295\u201339317. https:\/\/doi.org\/10.1109\/ACCESS.2023.3268064","journal-title":"IEEE Access"},{"issue":"10","key":"2114_CR10","doi-asserted-by":"publisher","first-page":"10250","DOI":"10.1109\/JIOT.2020.2997651","volume":"7","author":"W Iqbal","year":"2020","unstructured":"Iqbal W, Abbas H, Daneshmand M, Rauf B, Bangash YA (2020) An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet Things J 7(10):10250\u201310276. https:\/\/doi.org\/10.1109\/JIOT.2020.2997651","journal-title":"IEEE Internet Things J"},{"key":"2114_CR11","doi-asserted-by":"publisher","first-page":"138627","DOI":"10.1109\/ACCESS.2024.3413071","volume":"12","author":"L Abuserrieh","year":"2024","unstructured":"Abuserrieh L, Alalfi MH (2024) A survey on verification of security and safety in iot systems. IEEE Access 12:138627\u2013138645. https:\/\/doi.org\/10.1109\/ACCESS.2024.3413071","journal-title":"IEEE Access"},{"issue":"15","key":"2114_CR12","doi-asserted-by":"publisher","first-page":"5952","DOI":"10.1109\/JSEN.2019.2910881","volume":"19","author":"H Kharrufa","year":"2019","unstructured":"Kharrufa H, Al-Kashoash HAA, Kemp AH (2019) RPL-based routing protocols in iot applications: a review. IEEE Sens J 19(15):5952\u20135967. https:\/\/doi.org\/10.1109\/JSEN.2019.2910881","journal-title":"IEEE Sens J"},{"key":"2114_CR13","doi-asserted-by":"publisher","unstructured":"Glissa G, Rachedi A, Meddeb A (2016) A secure routing protocol based on RPL for internet of things. In: 2016 IEEE global communications conference (GLOBECOM), Washington, pp 1\u20137. https:\/\/doi.org\/10.1109\/GLOCOM.2016.7841543","DOI":"10.1109\/GLOCOM.2016.7841543"},{"key":"2114_CR14","doi-asserted-by":"publisher","first-page":"188082","DOI":"10.1109\/ACCESS.2020.3029847","volume":"8","author":"SN Swamy","year":"2020","unstructured":"Swamy SN, Kota SR (2020) An empirical study on system level aspects of internet of things (IoT). IEEE Access 8:188082\u2013188134. https:\/\/doi.org\/10.1109\/ACCESS.2020.3029847","journal-title":"IEEE Access"},{"key":"2114_CR15","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.micpro.2019.05.010","volume":"69","author":"B Safaei","year":"2019","unstructured":"Safaei B, Salehi AAM, Monazzah AMH, Ejlali A (2019) Effects of RPL objective functions on the primitive characteristics of mobile and static IoT infrastructures. Microprocess Microsyst 69:79\u201391. https:\/\/doi.org\/10.1016\/j.micpro.2019.05.010","journal-title":"Microprocess Microsyst"},{"key":"2114_CR16","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1504\/IJCSE.2020.111435","volume":"23","author":"A Mishra","year":"2020","unstructured":"Mishra A, Sinha M, Tripathy A (2020) A sinkhole prevention mechanism for RPL in IoT. Int J Comput Sci Eng 23:262. https:\/\/doi.org\/10.1504\/IJCSE.2020.111435","journal-title":"Int J Comput Sci Eng"},{"key":"2114_CR17","doi-asserted-by":"publisher","unstructured":"Eastman D, Kumar SAP (2017) A simulation study to detect attacks on internet of things. In: 2017 IEEE 15th intl conf on dependable, autonomic and secure computing, 15th intl conf on pervasive intelligence and computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC\/PiCom\/DataCom\/CyberSciTech), pp 645\u2013650. https:\/\/doi.org\/10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.113","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.113"},{"issue":"2","key":"2114_CR18","doi-asserted-by":"publisher","first-page":"1582","DOI":"10.1109\/COMST.2018.2885894","volume":"21","author":"A Raoof","year":"2019","unstructured":"Raoof A, Matrawy A, Lung C-H (2019) Routing attacks and mitigation methods for RPL-based internet of things. IEEE Commun Surv Tutor 21(2):1582\u20131606. https:\/\/doi.org\/10.1109\/COMST.2018.2885894","journal-title":"IEEE Commun Surv Tutor"},{"key":"2114_CR19","doi-asserted-by":"publisher","unstructured":"Choudhary S, Kesswani N (2019) Cluster-based intrusion detection method for internet of things. In: 2019 IEEE\/ACS 16th international conference on computer systems and applications (AICCSA), pp 1\u20138. https:\/\/doi.org\/10.1109\/AICCSA47632.2019.9035319","DOI":"10.1109\/AICCSA47632.2019.9035319"},{"key":"2114_CR20","doi-asserted-by":"publisher","first-page":"94081","DOI":"10.1109\/ACCESS.2023.3310242","volume":"11","author":"S Al-Sarawi","year":"2023","unstructured":"Al-Sarawi S, Anbar M, Alabsi BA, Aladaileh MA, Rihan SDA (2023) Passive rule-based approach to detect sinkhole attack in rpl-based internet of things networks. IEEE Access 11:94081\u201394093. https:\/\/doi.org\/10.1109\/ACCESS.2023.3310242","journal-title":"IEEE Access"},{"issue":"11","key":"2114_CR21","doi-asserted-by":"publisher","first-page":"5666","DOI":"10.1109\/JSEN.2020.2973677","volume":"20","author":"A Verma","year":"2020","unstructured":"Verma A, Ranga V (2020) Security of RPL based 6LoWPAN networks in the internet of things: a review. IEEE Sens J 20(11):5666\u20135690. https:\/\/doi.org\/10.1109\/JSEN.2020.2973677","journal-title":"IEEE Sens J"},{"key":"2114_CR22","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8847099","author":"JY Lee","year":"2021","unstructured":"Lee JY, Lee J (2021) Current research trends in IoT security: a systematic mapping study. Mob Inf Syst. https:\/\/doi.org\/10.1155\/2021\/8847099","journal-title":"Mob Inf Syst"},{"issue":"1","key":"2114_CR23","doi-asserted-by":"publisher","first-page":"2181","DOI":"10.1002\/nem.2181","volume":"32","author":"GHC Oliveira","year":"2022","unstructured":"Oliveira GHC, Souza Batista A, Nogueira M, Santos AL (2022) An access control for iot based on network community perception and social trust against sybil attacks. Int J Netw Manag 32(1):2181. https:\/\/doi.org\/10.1002\/nem.2181","journal-title":"Int J Netw Manag"},{"issue":"5","key":"2114_CR24","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2201","volume":"32","author":"C Pedroso","year":"2022","unstructured":"Pedroso C, Santos A (2022) Dissemination control in dynamic data clustering for dense IIoT against false data injection attack. Int J Netw Manag 32(5):2201. https:\/\/doi.org\/10.1002\/nem.2201","journal-title":"Int J Netw Manag"},{"key":"2114_CR25","doi-asserted-by":"publisher","unstructured":"Karthigadevi K, Balamurali S, Venkatesulu M (2019) Based on neighbor density estimation technique to improve the quality of service and to detect and prevent the sinkhole attack in wireless sensor network. In: 2019 IEEE international conference on intelligent techniques in control, optimization and signal processing (INCOS), Tamilnadu, pp 1\u20134. https:\/\/doi.org\/10.1109\/INCOS45849.2019.8951406","DOI":"10.1109\/INCOS45849.2019.8951406"},{"key":"2114_CR26","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1016\/j.future.2018.03.021","volume":"93","author":"D Airehrour","year":"2019","unstructured":"Airehrour D, Gutierrez JA, Ray SK (2019) SecTrust-RPL: a secure trust-aware RPL routing protocol for Internet of Things. Future Gener Comput Syst 93:860\u2013876","journal-title":"Future Gener Comput Syst"},{"key":"2114_CR27","doi-asserted-by":"crossref","unstructured":"Pundir S, Wazid M, Singh DP, Das AK, Rodrigues JJ, Park Y (2020) Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment. Sensors 20(5)","DOI":"10.3390\/s20051300"},{"issue":"1","key":"2114_CR28","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/TNSE.2018.2881152","volume":"7","author":"Y Liu","year":"2020","unstructured":"Liu Y, Ma M, Liu X, Xiong NN, Liu A, Zhu Y (2020) Design and analysis of probing route to defense sink-hole attacks for internet of things security. IEEE Trans Netw Sci Eng 7(1):356\u2013372. https:\/\/doi.org\/10.1109\/TNSE.2018.2881152","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"2114_CR29","first-page":"606","volume":"8","author":"C Cervantes","year":"2015","unstructured":"Cervantes C, Poplade D, Nogueira M, Santos A (2015) Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for internet of things. Int Symp Integr Netw Manag 8:606\u2013611","journal-title":"Int Symp Integr Netw Manag"},{"key":"2114_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103286","volume":"151","author":"N Schweitzer","year":"2023","unstructured":"Schweitzer N, Dvir A, Stulman A (2023) Network wormhole attacks without a traditional wormhole. Ad Hoc Netw 151:103286. https:\/\/doi.org\/10.1016\/j.adhoc.2023.103286","journal-title":"Ad Hoc Netw"},{"key":"2114_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108413","volume":"198","author":"K Prathapchandran","year":"2021","unstructured":"Prathapchandran K, Janani T (2021) A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest - RFTRUST. Comput Netw 198:108413. https:\/\/doi.org\/10.1016\/j.comnet.2021.108413","journal-title":"Comput Netw"},{"key":"2114_CR32","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.comcom.2016.12.001","volume":"98","author":"H Bostani","year":"2017","unstructured":"Bostani H, Sheikhan M (2017) Hybrid of anomaly-based and specification-based ids for internet of things using unsupervised opf based on mapreduce approach. Comput Commun 98:52\u201371. https:\/\/doi.org\/10.1016\/j.comcom.2016.12.001","journal-title":"Comput Commun"},{"key":"2114_CR33","doi-asserted-by":"publisher","first-page":"94081","DOI":"10.1109\/ACCESS.2023.3310242","volume":"11","author":"S Al-Sarawi","year":"2023","unstructured":"Al-Sarawi S, Anbar M, Alabsi BA, Aladaileh MA, Rihan SDA (2023) Passive rule-based approach to detect sinkhole attack in rpl-based internet of things networks. IEEE Access 11:94081\u201394093. https:\/\/doi.org\/10.1109\/ACCESS.2023.3310242","journal-title":"IEEE Access"},{"key":"2114_CR34","doi-asserted-by":"publisher","unstructured":"Yu S, Wang X, Shen Y, Wu G, Yu S, Shen S (2024) Novel intrusion detection strategies with optimal hyper parameters for industrial internet of things based on stochastic games and double deep q-networks. IEEE Internet of Things J 1\u20131. https:\/\/doi.org\/10.1109\/JIOT.2024.3406386","DOI":"10.1109\/JIOT.2024.3406386"},{"key":"2114_CR35","doi-asserted-by":"publisher","unstructured":"Shen Y, Shepherd C, Ahmed M, Shen S, Yu S (2024) Sgd3qn: joint stochastic games and dueling double deep q-networks for defending malware propagation in edge intelligence-enabled internet of things. IEEE Trans Inf Forens Secur 1\u20131. https:\/\/doi.org\/10.1109\/TIFS.2024.3420233","DOI":"10.1109\/TIFS.2024.3420233"},{"issue":"7","key":"2114_CR36","doi-asserted-by":"publisher","first-page":"12536","DOI":"10.1109\/JIOT.2023.3333903","volume":"11","author":"S Yu","year":"2024","unstructured":"Yu S, Zhai R, Shen Y, Wu G, Zhang H, Yu S, Shen S (2024) Deep q-network-based open-set intrusion detection solution for industrial internet of things. IEEE Internet Things J 11(7):12536\u201312550. https:\/\/doi.org\/10.1109\/JIOT.2023.3333903","journal-title":"IEEE Internet Things J"},{"key":"2114_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.111080","volume":"150","author":"S Shen","year":"2024","unstructured":"Shen S, Cai C, Li Z, Shen Y, Wu G, Yu S (2024) Deep q-network-based heuristic intrusion detection against edge-based siot zero-day attacks. Appl Soft Comput 150:111080. https:\/\/doi.org\/10.1016\/j.asoc.2023.111080","journal-title":"Appl Soft Comput"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02114-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02114-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02114-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:39:19Z","timestamp":1760683159000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02114-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":37,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2114"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02114-5","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,9]]},"assertion":[{"value":"1 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"279"}}