{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:39:04Z","timestamp":1776926344771,"version":"3.51.2"},"reference-count":30,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064414","type":"journal-article","created":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T03:54:28Z","timestamp":1751601268000},"page":"5381-5402","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["NADSA: A Novel Approach for Detection of Sinkhole Attacks Based on RPL Protocol in 6LowPAN Network"],"prefix":"10.32604","volume":"84","author":[{"given":"Atena","family":"Shiranzaei","sequence":"first","affiliation":[]},{"given":"Emad","family":"Alizadeh","sequence":"additional","affiliation":[]},{"given":"Mahdi","family":"Rabbani","sequence":"additional","affiliation":[]},{"given":"Sajjad Bagheri Baba","family":"Ahmadi","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Tajgardan","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"492","DOI":"10.17762\/ijritcc.v11i7s.7027","article-title":"A novel detection method for grey hole attack in RPL","volume":"11","author":"Shiranzaei","year":"2023","journal-title":"Int J Recent Innov Trends Comput Commun"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"3028","DOI":"10.1109\/ACCESS.2017.2676119","article-title":"Secure signature-based authenticated key establishment scheme for future IoT applications","volume":"5","author":"Challa","year":"2017","journal-title":"IEEE Access"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"4878","DOI":"10.3390\/app13084878","article-title":"RPL-based IoT networks under simple and complex routing security attacks: an experimental study","volume":"13","author":"Alsukayti","year":"2023","journal-title":"Appl Sci"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"103759","DOI":"10.1016\/j.jnca.2023.103759","article-title":"Survey on the authentication and key agreement of 6LoWPAN: open issues and future direction","volume":"221","author":"Ashrif","year":"2023","journal-title":"J Netw Comput Appl"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"3400","DOI":"10.3390\/s22093400","article-title":"A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things","volume":"22","author":"Al-Amiedy","year":"2022","journal-title":"Sensors"},{"key":"ref6","first-page":"524","article-title":"IoT based agriculture (Ag-IoT): a detailed study on architecture, security and forensics","volume":"11","author":"Rudrakar","year":"2024","journal-title":"Inf Process Agric"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/s10462-024-10907-y","article-title":"RPL-based attack detection approaches in IoT networks: review and taxonomy","volume":"57","author":"Alfriehat","year":"2024","journal-title":"Artif Intell Rev"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2983642","article-title":"Privacy-preserving multimedia big data aggregation in large-scale wireless sensor networks","volume":"12","author":"Wu","year":"2016","journal-title":"ACM Trans Multimed Comput Commun Appl (TOMM)"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"94081","DOI":"10.1109\/ACCESS.2023.3310242","article-title":"Passive rule-based approach to detect sinkhole attack in RPL-based internet of things networks","volume":"11","author":"Al-Sarawi","year":"2023","journal-title":"IEEE Access"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"59353","DOI":"10.1109\/ACCESS.2021.3073408","article-title":"Internet of things applications, security challenges, attacks, intrusion detection, and future visions: a systematic review","volume":"9","author":"Mishra","year":"2021","journal-title":"IEEE Access"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"4596","DOI":"10.1002\/sec.1652","article-title":"Design of sinkhole node detection mechanism for hierarchical wireless sensor networks","volume":"9","author":"Wazid","year":"2016","journal-title":"Secur Commun Netw"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1049\/wss2.12069","article-title":"Securing smart home against sinkhole attack using weight-based IDS placement strategy","volume":"13","author":"Islam","year":"2023","journal-title":"IET Wire Sens Syst"},{"key":"ref13","series-title":"2009 ICCAS-SICE","first-page":"1966","article-title":"Detecting sinkhole attacks in wireless sensor networks","author":"Tumrongwittayapak","year":"2009 Aug 18\u201321"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","article-title":"SVELTE: real-time intrusion detection in the Internet of Things","volume":"11","author":"Raza","year":"2013","journal-title":"Ad Hoc Netw"},{"key":"ref15","series-title":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET); 2016 Mar 23\u201325; Chennai, India","first-page":"1903","article-title":"InDReS: an intrusion detection and response system for internet of things with 6LoWPAN","author":"Surendar"},{"key":"ref16","series-title":"2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM)","first-page":"606","article-title":"Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things","author":"Cervantes","year":"2015 May 11\u201315"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","article-title":"A survey of intrusion detection in Internet of Things","volume":"84","author":"Zarpel\u00e3o","year":"2017","journal-title":"J Netw Comput Appl"},{"key":"ref18","series-title":"2016 IEEE Global Communications Conference (GLOBECOM)","first-page":"1","article-title":"A secure routing protocol based on RPL for Internet of Things","author":"Glissa","year":"2016 Dec 4\u20138"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1016\/j.future.2018.03.021","article-title":"SecTrust-RPL: a secure trust-aware RPL routing protocol for Internet of Things","volume":"93","author":"Airehrour","year":"2019","journal-title":"Fut Gen Comput Syst"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"102343","DOI":"10.1016\/j.scs.2020.102343","article-title":"A novel and secure attacks detection framework for smart cities industrial internet of things","volume":"61","author":"Qureshi","year":"2020","journal-title":"Sustain Cities Soc"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1007\/s11277-020-07421-z","article-title":"SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism","volume":"114","author":"Zaminkar","year":"2020","journal-title":"Wire Pers Commun"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"5997","DOI":"10.3390\/s20215997","article-title":"Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP","volume":"20","author":"Almusaylim","year":"2020","journal-title":"Sensors"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"108413","DOI":"10.1016\/j.comnet.2021.108413","article-title":"A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest-RFTRUST","volume":"198","author":"Prathapchandran","year":"2021","journal-title":"Comput Netw"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1016\/j.aej.2025.01.087","article-title":"Advanced network security with an integrated trust-based intrusion detection system for routing protocol","volume":"120","author":"Kumar","year":"2025","journal-title":"Alex Eng J"},{"key":"ref25","author":"Vasseur","year":"2012","journal-title":"Routing metrics used for path calculation in low-power and lossy networks"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4842-3408-2","author":"Kurniawan","year":"2018","journal-title":"Practical Contiki-NG: programming for wireless sensor networks"},{"key":"ref27","series-title":"2006 31st IEEE Conference on Local Computer Networks","first-page":"641","article-title":"Cross-level sensor network simulation with cooja","author":"Osterlind","year":"2006 Nov 14\u201316"},{"key":"ref28","author":"Thomson","year":"2016","journal-title":"Cooja simulator manual"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"101089","DOI":"10.1016\/j.softx.2022.101089","article-title":"The Contiki-NG open source operating system for next generation IoT devices","volume":"18","author":"Oikonomou","year":"2022","journal-title":"SoftwareX"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"108824","DOI":"10.1016\/j.comnet.2022.108824","article-title":"On the design of efficient congestion control for the Constrained Application Protocol in IoT","volume":"207","author":"Makarem","year":"2022","journal-title":"Comput Netw"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_64414\/TSP_CMC_64414.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:30Z","timestamp":1776923130000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63134"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":30,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064414","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-02-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-19","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}