{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:14:02Z","timestamp":1757542442056,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Zayed University","doi-asserted-by":"publisher","award":["R22051"],"award-info":[{"award-number":["R22051"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,15]]},"DOI":"10.1145\/3638837.3638860","type":"proceedings-article","created":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T12:05:23Z","timestamp":1709813123000},"page":"6-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of Version Number Attack using Multiple RPL Instances"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-3407-9079","authenticated-orcid":false,"given":"Tawbah","family":"Ennab","sequence":"first","affiliation":[{"name":"Jordan University of Science and Technology, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8334-3281","authenticated-orcid":false,"given":"Yaser","family":"Khamayseh","sequence":"additional","affiliation":[{"name":"College of Technological Innovation , Zayed University, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4840-2290","authenticated-orcid":false,"given":"Wail","family":"Mardini","sequence":"additional","affiliation":[{"name":"Houston Christian University, USA and \rJordan University of Science and Technology, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4699-0006","authenticated-orcid":false,"given":"Yu","family":"Shen","sequence":"additional","affiliation":[{"name":"University of Ottawa, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0220-7956","authenticated-orcid":false,"given":"Burak","family":"Kantarci","sequence":"additional","affiliation":[{"name":"University of Ottawa, Canada"}]}],"member":"320","published-online":{"date-parts":[[2024,3,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847733"},{"key":"e_1_3_2_1_2_1","unstructured":"Dave E. \"How the next evolution of the internet is changing everything.\" The Internet of Things (2011)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5741163"},{"key":"e_1_3_2_1_4_1","volume-title":"Key technology, architecture and challenging problems.\" 2011 IEEE International Conference on Computer Science and Automation Engineering","author":"Zhu Lin","year":"2011","unstructured":"Zhang, Handong, and Lin Zhu. \"Internet of Things: Key technology, architecture and challenging problems.\" 2011 IEEE International Conference on Computer Science and Automation Engineering. Vol. 4. IEEE, 2011."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Gubbi Jayavardhana \"Internet of Things (IoT): A vision architectural elements and future directions.\" Future generation computer systems 29.7 (2013): 1645-1660.","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v20.i3.pp1685-1692"},{"key":"e_1_3_2_1_7_1","unstructured":"IETF \"Improvement of RPL Protocol Algorithm for Smart Grid | IEEE Conference Publication | IEEE Xplore.\" https:\/\/ieeexplore.ieee.org\/abstract\/document\/8600162?casa_token=pJBiW8dpxvcAAAAA:U72VYFXU3YROV6J_kbKaPL0y7duke0XsUqGlO0qUNTggZxqJyPFxdkOCvsLlXE2J3fUMMeKoY-Eoz_s (accessed Oct. 31 2021)."},{"key":"e_1_3_2_1_8_1","unstructured":"IETF \"A Game Theoretic Optimization of RPL for Mobile Internet of Things Applications.\" https:\/\/ieeexplore.ieee.org\/abstract\/document\/8262647?casa_token=Ieo6vRxS45EAAAAA:XEmFQSh3mPsgfLWexR-kNc1PNF02wAvueSC5eMhOtf87gNNnYf3rq0gmONlhRETzWD8b-1gAjqvXTsQ (accessed Oct. 31 2021)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6550"},{"key":"e_1_3_2_1_10_1","volume-title":"Bidirectional Forwarding Detection (BFD) for IPv4 and IPv6 (Single Hop).\" https:\/\/tools.ietf.org\/html\/rfc5881 (accessed","author":"Katz D.","year":"2020","unstructured":"D. Katz and D. Ward, \"Bidirectional Forwarding Detection (BFD) for IPv4 and IPv6 (Single Hop).\" https:\/\/tools.ietf.org\/html\/rfc5881 (accessed Aug. 04, 2020)."},{"key":"e_1_3_2_1_11_1","volume-title":"Neighbor Discovery for IP version 6 (IPv6).\" https:\/\/tools.ietf.org\/html\/rfc4861 (accessed","author":"Narten T.","year":"2020","unstructured":"T. Narten, W. A. Simpson, E. Nordmark, and H. Soliman, \"Neighbor Discovery for IP version 6 (IPv6).\" https:\/\/tools.ietf.org\/html\/rfc4861 (accessed Aug. 04, 2020)."},{"key":"e_1_3_2_1_12_1","unstructured":"J. W. Hui \"The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams.\" https:\/\/tools.ietf.org\/html\/rfc6553 (accessed Aug. 04 2020)."},{"key":"e_1_3_2_1_13_1","volume-title":"The Trickle Algorithm.\" https:\/\/tools.ietf.org\/html\/rfc6206 (accessed","author":"Levis P.","year":"2020","unstructured":"P. Levis and T. H. Clausen, \"The Trickle Algorithm.\" https:\/\/tools.ietf.org\/html\/rfc6206 (accessed Aug. 04, 2020)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2910881"},{"key":"e_1_3_2_1_15_1","unstructured":"J. Dubrulle \"Quality of service & redundancy in rpl networks using contiki os \" 2016."},{"key":"e_1_3_2_1_16_1","unstructured":"P. Thubert pthubert \"Objective Function Zero for the Routing Protocol for Low-Power and Lossy Networks (RPL).\" https:\/\/tools.ietf.org\/html\/rfc6552 (accessed Aug. 04 2020)."},{"key":"e_1_3_2_1_17_1","volume-title":"https:\/\/tools.ietf.org\/id\/draft-gnawali-roll-etxof-01.html (accessed","author":"Objective IETF","year":"2020","unstructured":"IETF, \"The ETX Objective Function for RPL,\" Dec. 2010. https:\/\/tools.ietf.org\/id\/draft-gnawali-roll-etxof-01.html (accessed Aug. 04, 2020)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v22.i1.pp407-418"},{"key":"e_1_3_2_1_19_1","volume-title":"Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification.\" https:\/\/tools.ietf.org\/html\/rfc4443 (accessed","author":"Conta A.","year":"2020","unstructured":"A. Conta and M. Gupta, \"Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification.\" https:\/\/tools.ietf.org\/html\/rfc4443 (accessed Aug. 04, 2020)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.02.011"},{"key":"e_1_3_2_1_21_1","unstructured":"IETF \"Routing Over Low power and Lossy networks (roll) -.\" https:\/\/datatracker.ietf.org\/wg\/roll\/about\/ (accessed Aug. 04 2020)."},{"key":"e_1_3_2_1_22_1","volume-title":"https:\/\/tools.ietf.org\/id\/draft-ietf-roll-security-framework-07.html (accessed","author":"Doe J.","year":"2020","unstructured":"J. Doe, \"A Security Framework for Routing over Low Power and Lossy Networks,\" Dec. 2010. https:\/\/tools.ietf.org\/id\/draft-ietf-roll-security-framework-07.html (accessed Aug. 04, 2020)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERVASIVE.2015.7087034"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1501-5_54"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43862-6_12"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502897"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ATC.2015.7388321"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18082472"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134829.3134838"},{"key":"e_1_3_2_1_30_1","unstructured":"A. Alabdi \"using multiple RPL instances in healthcare applications \" Jordan University of Science and Technology 2019."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v18i4.15768"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v13.i2.pp677-682"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v21.i1.pp516-523"},{"key":"e_1_3_2_1_34_1","unstructured":"J. de la Cruz \"analysis of different routing attacks against wsns using rpl with contiki os and cooja simulator \" Edinburgh Napier University 2017."},{"key":"e_1_3_2_1_35_1","volume-title":"Nov. 10, 2018. https:\/\/iotbyhvm.ooo\/contiki-the-open-source-os-for-iot\/ (accessed","author":"Mishra H.","year":"2020","unstructured":"H. Mishra, \"Contiki OS: The Open Source OS for IoT,\" IoTbyHVM - Bits & Bytes of IoT, Nov. 10, 2018. https:\/\/iotbyhvm.ooo\/contiki-the-open-source-os-for-iot\/ (accessed Aug. 04, 2020)."},{"volume-title":"Accessed","year":"2020","key":"e_1_3_2_1_36_1","unstructured":"contiki-os\/contiki. The Contiki Open Source OS for the Internet of Things, 2020. Accessed: Aug. 04, 2020. [Online]. Available: https:\/\/github.com\/contiki-os\/contiki"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.045"},{"key":"e_1_3_2_1_38_1","first-page":"7","volume-title":"Exploring the Infinite Possible Ways to Compute the Performance Metrics of IOT Based Smart Devices to Understand the Working of IOT Based Compression & Routing Protocols","author":"Mehmood T.","unstructured":"T. Mehmood, \"COOJA Network Simulator: Exploring the Infinite Possible Ways to Compute the Performance Metrics of IOT Based Smart Devices to Understand the Working of IOT Based Compression & Routing Protocols,\" p. 7."},{"volume-title":"GitHub. https:\/\/github.com\/contiki-os\/contiki (accessed","year":"2020","key":"e_1_3_2_1_39_1","unstructured":"\u201ccontiki-os\/contiki,\u201d GitHub. https:\/\/github.com\/contiki-os\/contiki (accessed Aug. 04, 2020)."}],"event":{"name":"ICNCC 2023: 2023 the 12th International Conference on Networks, Communication and Computing","acronym":"ICNCC 2023","location":"Osaka Japan"},"container-title":["Proceedings of the 2023 12th International Conference on Networks, Communication and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638837.3638860","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3638837.3638860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:02:09Z","timestamp":1755907329000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638837.3638860"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,15]]},"references-count":39,"alternative-id":["10.1145\/3638837.3638860","10.1145\/3638837"],"URL":"https:\/\/doi.org\/10.1145\/3638837.3638860","relation":{},"subject":[],"published":{"date-parts":[[2023,12,15]]},"assertion":[{"value":"2024-03-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}