{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:21:17Z","timestamp":1766578877858},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:00:00Z","timestamp":1725840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:00:00Z","timestamp":1725840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-03200-w","type":"journal-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:02:11Z","timestamp":1725865331000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing Security in IoT Networks Through RDAD for Attack Detection in RPL-Enabled Environments"],"prefix":"10.1007","volume":"5","author":[{"given":"K.","family":"Sridhar","sequence":"first","affiliation":[]},{"given":"B. Anjanee","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"S. Anjali","family":"Devi","sequence":"additional","affiliation":[]},{"given":"Vadali Pitchi","family":"Raju","sequence":"additional","affiliation":[]},{"given":"Anita","family":"Soni","sequence":"additional","affiliation":[]},{"given":"Pallavi","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Shailesh Shivaji","family":"Deore","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,9]]},"reference":[{"issue":"3","key":"3200_CR1","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s11235-017-0345-9","volume":"67","author":"V Adat","year":"2018","unstructured":"Adat V, Gupta BB. Security in Internet of Things: issues, challenges, taxonomy, and architecture. Telecommun Syst. 2018;67(3):423\u201341.","journal-title":"Telecommun Syst"},{"key":"3200_CR2","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.jnca.2016.03.006","volume":"66","author":"A David","year":"2016","unstructured":"David A, Gutierrez J, Ray SK. Secure routing for internet of things: a survey. J Netw Comput Appl. 2016;66:198\u2013213.","journal-title":"J Netw Comput Appl"},{"issue":"7","key":"3200_CR3","first-page":"1","volume":"111","author":"MU Farooq","year":"2015","unstructured":"Farooq MU, Wasem M, Khairi A, Mazhar S. A critical analysis on the security concerns of internet of things (IoT). Int J Comput Appl. 2015;111(7):1\u20136.","journal-title":"Int J Comput Appl"},{"key":"3200_CR4","unstructured":"Fathallah K, Abid MA, Ben Hadj-alouane N. Internet of things in the service of precision agriculture. In: The 1st Computer Science UTM PhD Symposium (CUPS\u20192017), Tunis, 2017."},{"issue":"1","key":"3200_CR5","doi-asserted-by":"publisher","first-page":"28","DOI":"10.54216\/JCIM.130103","volume":"13","author":"V Roy","year":"2024","unstructured":"Roy V. A Context-Aware Internet of Things (IoT) founded approach to scheming an operative priority-based scheduling algorithms. J Cybersecur Inform Manag. 2024;13(1):28\u201335.","journal-title":"J Cybersecur Inform Manag"},{"issue":"4","key":"3200_CR6","first-page":"3119","volume":"9","author":"PK Shukla","year":"2020","unstructured":"Shukla PK, Roy V, Shukla PK. Network physical address based encryption technique using digital logic. Int J Sci Technol Res. 2020;9(4):3119\u201322.","journal-title":"Int J Sci Technol Res"},{"key":"3200_CR7","doi-asserted-by":"publisher","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","volume":"7","author":"V Hassija","year":"2019","unstructured":"Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B. A Survey on IoT security: application areas, security threats, and solution architectures. IEEE Access. 2019;7:82721\u201343.","journal-title":"IEEE Access"},{"key":"3200_CR8","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1186\/s40537-020-00318-5","volume":"7","author":"IH Sarker","year":"2020","unstructured":"Sarker IH, Kayes ASM, Badsha S, Alqahtani H, Watters P, Ng A. Cybersecurity data science: an overview from machine learning perspective. J Big Data. 2020;7:41.","journal-title":"J Big Data"},{"key":"3200_CR9","doi-asserted-by":"publisher","first-page":"7946","DOI":"10.1109\/JIOT.2019.2907245","volume":"6","author":"Z Ma","year":"2019","unstructured":"Ma Z, Xiao M, Xiao Y, Pang Z, Poor HV, Vucetic B. High-reliability and low-latency wireless communication for internet of things: challenges, fundamentals, and enabling technologies. IEEE Internet Things J. 2019;6:7946\u201370.","journal-title":"IEEE Internet Things J"},{"key":"3200_CR10","doi-asserted-by":"publisher","first-page":"2055","DOI":"10.1109\/TSC.2019.2907247","volume":"14","author":"DB Rawat","year":"2019","unstructured":"Rawat DB, Doku R, Garuba M. Cybersecurity in Big data era: from securing big data to data-driven security. IEEE Trans Serv Comput. 2019;14:2055\u201372.","journal-title":"IEEE Trans Serv Comput"},{"key":"3200_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107859","volume":"189","author":"A Farrokhi","year":"2021","unstructured":"Farrokhi A, Farahbakhsh R, Rezazadeh J, Minerva R. Application of Internet of Things and artificial intelligence for smart fitness: a survey. Comput Netw. 2021;189: 107859.","journal-title":"Comput Netw"},{"key":"3200_CR12","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-031-04524-0_10","volume-title":"IoT based smart applications","author":"J Kaur","year":"2023","unstructured":"Kaur J, Jaskaran Sindhwani N, Anand R, Pandey D. Implementation of IoT in various domains. In: Sindhwani N, Anand R, Niranjanamurthy M, Verma DC, Valentina EB, editors. IoT based smart applications. Berlin: Springer; 2023. p. 165\u201378."},{"key":"3200_CR13","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MITP.2019.2912729","volume":"21","author":"C Stracener","year":"2019","unstructured":"Stracener C, Samelson Q, Mackie J, Ihaza M. The Internet of Things grows artificial intelligence and data sciences. IT Prof. 2019;21:55\u201362.","journal-title":"IT Prof"},{"key":"3200_CR14","doi-asserted-by":"publisher","first-page":"28177","DOI":"10.1109\/ACCESS.2021.3052867","volume":"9","author":"VA Thakor","year":"2021","unstructured":"Thakor VA, Razzaque MA, Khandaker MRA. Lightweight cryptography algorithms for resource-constrained IoT devices: a review. Comparison and Research Opportunities IEEE Access. 2021;9:28177\u201393.","journal-title":"Comparison and Research Opportunities IEEE Access"},{"key":"3200_CR15","doi-asserted-by":"publisher","first-page":"3625","DOI":"10.3390\/s20133625","volume":"20","author":"H Mrabet","year":"2020","unstructured":"Mrabet H, Belguith S, Alhomoud A, Jemai A. A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors. 2020;20:3625.","journal-title":"Sensors"},{"key":"3200_CR16","doi-asserted-by":"publisher","first-page":"1372","DOI":"10.1109\/COMST.2020.2976075","volume":"22","author":"SA Hamad","year":"2020","unstructured":"Hamad SA, Sheng QZ, Zhang WE, Nepal S. Realizing an internet of secure things: a survey on issues and enabling technologies. IEEE Commun Surv Tutor. 2020;22:1372\u201391.","journal-title":"IEEE Commun Surv Tutor"},{"key":"3200_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100129","volume":"14","author":"H HaddadPajouh","year":"2021","unstructured":"HaddadPajouh H, Dehghantanha A, Parizi RM, Aledhari M, Karimipour H. A survey on internet of things security: requirements, challenges, and solutions. Internet Things. 2021;14: 100129.","journal-title":"Internet Things"},{"key":"3200_CR18","doi-asserted-by":"publisher","first-page":"6984","DOI":"10.3390\/en15196984","volume":"15","author":"A Goudarzi","year":"2022","unstructured":"Goudarzi A, Ghayoor F, Waseem M, Fahad S, Traore I. A survey on IoT-enabled smart grids: emerging, applications, challenges, and outlook. Energies. 2022;15:6984.","journal-title":"Energies"},{"key":"3200_CR19","doi-asserted-by":"publisher","DOI":"10.3389\/frai.2022.812732","volume":"5","author":"G Yang","year":"2022","unstructured":"Yang G. An overview of current solutions for privacy in the Internet of Things. Front Artif Intell. 2022;5: 812732.","journal-title":"Front Artif Intell"},{"issue":"2","key":"3200_CR20","doi-asserted-by":"publisher","first-page":"8","DOI":"10.54216\/JCIM.120201","volume":"12","author":"V Roy","year":"2023","unstructured":"Roy V. An effective FOG computing based distributed forecasting of cyber-attacks in Internet of Things. J Cybersecuri Inform Manag. 2023;12(2):8\u201317.","journal-title":"J Cybersecuri Inform Manag"},{"key":"3200_CR21","doi-asserted-by":"publisher","first-page":"2181","DOI":"10.3390\/electronics11142181","volume":"11","author":"H Taherdoost","year":"2022","unstructured":"Taherdoost H. Understanding cybersecurity frameworks and information security standards\u2014a review and comprehensive overview. Electronics. 2022;11:2181.","journal-title":"Electronics"},{"key":"3200_CR22","doi-asserted-by":"publisher","first-page":"105124","DOI":"10.1016\/j.knosys.2019.105124","volume":"189","author":"A Aldweesh","year":"2020","unstructured":"Aldweesh A, Derhab A, Emam AZ. Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues. Knowl-Based Syst. 2020;189:105124.","journal-title":"Knowl-Based Syst"},{"key":"3200_CR23","first-page":"1","volume":"2021","author":"M Pan","year":"2021","unstructured":"Pan M, Tian S, Yuan J, Chen S. Simulation of dynamic user network connection anti-interference and security authentication method based on ubiquitous Internet of Things. Math Probl Eng. 2021;2021:1\u20138.","journal-title":"Math Probl Eng"},{"key":"3200_CR24","doi-asserted-by":"publisher","first-page":"6143","DOI":"10.1109\/JIOT.2020.2977196","volume":"7","author":"DV Medhane","year":"2020","unstructured":"Medhane DV, Sangaiah AK, Hossain MS, Muhammad G, Wang J. Blockchain-enabled distributed security framework for next-generation IoT: An edge cloud and software-defined network-integrated approach. IEEE Internet Things J. 2020;7:6143\u20139.","journal-title":"IEEE Internet Things J"},{"key":"3200_CR25","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/s12652-018-0949-2","volume":"11","author":"Q Zhang","year":"2020","unstructured":"Zhang Q, Xu D. Security authentication technology based on dynamic Bayesian network in Internet of Things. J Ambient Intell Humaniz Comput. 2020;11:573\u201380.","journal-title":"J Ambient Intell Humaniz Comput"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03200-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03200-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03200-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:20:31Z","timestamp":1725866431000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03200-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,9]]},"references-count":25,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2024,10]]}},"alternative-id":["3200"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03200-w","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,9]]},"assertion":[{"value":"8 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article does not contain any studies with animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"864"}}