{"id":"https://openalex.org/W4391877699","doi":"https://doi.org/10.1109/comsnets59351.2024.10427337","title":"An Experimental Comparison and Impact Analysis of Various RPL-Based IoT Security Threats Using Contiki Simulator","display_name":"An Experimental Comparison and Impact Analysis of Various RPL-Based IoT Security Threats Using Contiki Simulator","publication_year":2024,"publication_date":"2024-01-03","ids":{"openalex":"https://openalex.org/W4391877699","doi":"https://doi.org/10.1109/comsnets59351.2024.10427337"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets59351.2024.10427337","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets59351.2024.10427337","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 16th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100709363","display_name":"Darshan Kumar","orcid":"https://orcid.org/0009-0009-7708-3266"},"institutions":[{"id":"https://openalex.org/I187761245","display_name":"National Institute of Technology Jamshedpur","ror":"https://ror.org/01sebzx27","country_code":"IN","type":"education","lineage":["https://openalex.org/I187761245"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Darshan Kumar","raw_affiliation_strings":["National Institute of Technology Jamshedpur,Department of Computer Science and Engg.,Jamshedpur,India","Department of Computer Science and Engg., National Institute of Technology Jamshedpur, Jamshedpur, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Jamshedpur,Department of Computer Science and Engg.,Jamshedpur,India","institution_ids":["https://openalex.org/I187761245"]},{"raw_affiliation_string":"Department of Computer Science and Engg., National Institute of Technology Jamshedpur, Jamshedpur, India","institution_ids":["https://openalex.org/I187761245"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108901600","display_name":"Nidhi Sinha","orcid":null},"institutions":[{"id":"https://openalex.org/I187761245","display_name":"National Institute of Technology Jamshedpur","ror":"https://ror.org/01sebzx27","country_code":"IN","type":"education","lineage":["https://openalex.org/I187761245"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nidhi Sinha","raw_affiliation_strings":["National Institute of Technology Jamshedpur,Department of Computer Science and Engg.,Jamshedpur,India","Department of Computer Science and Engg., National Institute of Technology Jamshedpur, Jamshedpur, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Jamshedpur,Department of Computer Science and Engg.,Jamshedpur,India","institution_ids":["https://openalex.org/I187761245"]},{"raw_affiliation_string":"Department of Computer Science and Engg., National Institute of Technology Jamshedpur, Jamshedpur, India","institution_ids":["https://openalex.org/I187761245"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057038181","display_name":"Alekha Kumar Mishra","orcid":"https://orcid.org/0000-0002-5461-7845"},"institutions":[{"id":"https://openalex.org/I187761245","display_name":"National Institute of Technology Jamshedpur","ror":"https://ror.org/01sebzx27","country_code":"IN","type":"education","lineage":["https://openalex.org/I187761245"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Alekha Kumar Mishra","raw_affiliation_strings":["National Institute of Technology Jamshedpur,Department of Computer Science and Engg.,Jamshedpur,India","Department of Computer Science and Engg., National Institute of Technology Jamshedpur, Jamshedpur, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Jamshedpur,Department of Computer Science and Engg.,Jamshedpur,India","institution_ids":["https://openalex.org/I187761245"]},{"raw_affiliation_string":"Department of Computer Science and Engg., National Institute of Technology Jamshedpur, Jamshedpur, India","institution_ids":["https://openalex.org/I187761245"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020998500","display_name":"Asis Kumar Tripathy","orcid":"https://orcid.org/0000-0003-2685-9860"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Asis Kumar Tripathy","raw_affiliation_strings":["Vellore Institute of Technology,SCORE,Vellore,India","SCORE, Vellore Institute of Technology, Vellore, India"],"affiliations":[{"raw_affiliation_string":"Vellore Institute of Technology,SCORE,Vellore,India","institution_ids":["https://openalex.org/I876193797"]},{"raw_affiliation_string":"SCORE, Vellore Institute of Technology, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100709363"],"corresponding_institution_ids":["https://openalex.org/I187761245"],"apc_list":null,"apc_paid":null,"fwci":1.4653,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.81342999,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"111","last_page":"116"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.899399995803833,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.899399995803833,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14484","display_name":"Technology and Data Analysis","score":0.8385999798774719,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.8216000199317932,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7575385570526123},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6608259081840515},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.36599138379096985},{"id":"https://openalex.org/keywords/simulation","display_name":"Simulation","score":0.3607625961303711}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7575385570526123},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6608259081840515},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36599138379096985},{"id":"https://openalex.org/C44154836","wikidata":"https://www.wikidata.org/wiki/Q45045","display_name":"Simulation","level":1,"score":0.3607625961303711}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets59351.2024.10427337","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets59351.2024.10427337","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 16th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2122682296","https://openalex.org/W2325877089","https://openalex.org/W2460667315","https://openalex.org/W2541307573","https://openalex.org/W2610120714","https://openalex.org/W2897514040","https://openalex.org/W2904959125","https://openalex.org/W2946805489","https://openalex.org/W2986455874","https://openalex.org/W2996365626","https://openalex.org/W2999472659","https://openalex.org/W3006589602","https://openalex.org/W3009103980","https://openalex.org/W3011786875","https://openalex.org/W3095270432","https://openalex.org/W3206426420","https://openalex.org/W4205946811","https://openalex.org/W4206126024","https://openalex.org/W4225884806","https://openalex.org/W4238809472","https://openalex.org/W4382288955"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4245926026","https://openalex.org/W2586548817","https://openalex.org/W4311097251","https://openalex.org/W2390279801","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W2358668433","https://openalex.org/W4200598720","https://openalex.org/W2921026492"],"abstract_inverted_index":{"The":[0,85],"Routing":[1],"Protocol":[2],"for":[3,18,63,81],"Low-Power":[4],"and":[5,29,77,95,112],"Lossy":[6],"Networks":[7],"(RPL)":[8],"is":[9,42,79,91],"used":[10],"by":[11],"many":[12],"Internet":[13],"of":[14,21,60,67,88,97,100,104],"Things":[15],"(IoT)":[16],"applications":[17],"routing":[19,118],"because":[20],"its":[22],"energy-efficient":[23],"process,":[24],"accessibility":[25],"to":[26,31,44],"secure":[27],"modes,":[28],"adaptability":[30],"operate":[32],"in":[33,120],"various":[34,52],"conditions.":[35],"IoT":[36],"devices":[37],"are":[38],"resource-constrained;":[39],"therefore,":[40],"RPL":[41,68,117],"prone":[43],"numerous":[45],"threats":[46],"that":[47,70],"degrade":[48],"network":[49,123],"performance":[50,119],"using":[51,125],"resources.":[53],"This":[54],"paper":[55,90],"provides":[56],"a":[57,82,101,121],"detailed":[58],"study":[59],"possible":[61],"attacks":[62,69],"RPL.":[64],"A":[65],"taxonomy":[66],"considers":[71],"crucial":[72],"factors":[73],"like":[74],"resources,":[75],"topology,":[76],"traffic":[78],"provided":[80],"better":[83],"understanding.":[84],"novel":[86],"contribution":[87],"this":[89],"the":[92,98],"experimental":[93],"comparison":[94],"analysis":[96],"impact":[99],"selected":[102],"list":[103],"four":[105],"higher-level":[106],"threats:":[107],"Sinkhole,":[108],"Blackhole,":[109],"Version":[110],"Number,":[111],"DIS":[113],"Flooding":[114],"Attack":[115],"on":[116],"given":[122],"scenario":[124],"Contiki/Cooja":[126],"simulator.":[127]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
