{"id":"https://openalex.org/W2903177235","doi":"https://doi.org/10.1109/icacci.2018.8554471","title":"RMDD: Cross Layer Attack in Internet of Things","display_name":"RMDD: Cross Layer Attack in Internet of Things","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2903177235","doi":"https://doi.org/10.1109/icacci.2018.8554471","mag":"2903177235"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2018.8554471","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2018.8554471","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014402833","display_name":"Vivek Kumar Asati","orcid":null},"institutions":[{"id":"https://openalex.org/I83205935","display_name":"Malaviya National Institute of Technology Jaipur","ror":"https://ror.org/0077k1j32","country_code":"IN","type":"education","lineage":["https://openalex.org/I83205935"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Vivek Kumar Asati","raw_affiliation_strings":["Department of Computer Science and Engineering, Malaviya National Institute of Technology, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Malaviya National Institute of Technology, Jaipur, India","institution_ids":["https://openalex.org/I83205935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040360984","display_name":"Emmanuel S. Pilli","orcid":"https://orcid.org/0000-0002-6056-1147"},"institutions":[{"id":"https://openalex.org/I83205935","display_name":"Malaviya National Institute of Technology Jaipur","ror":"https://ror.org/0077k1j32","country_code":"IN","type":"education","lineage":["https://openalex.org/I83205935"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Emmanuel S. Pilli","raw_affiliation_strings":["Department of Computer Science and Engineering, Malaviya National Institute of Technology, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Malaviya National Institute of Technology, Jaipur, India","institution_ids":["https://openalex.org/I83205935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015414891","display_name":"Santosh Kumar Vipparthi","orcid":"https://orcid.org/0000-0002-5672-3537"},"institutions":[{"id":"https://openalex.org/I83205935","display_name":"Malaviya National Institute of Technology Jaipur","ror":"https://ror.org/0077k1j32","country_code":"IN","type":"education","lineage":["https://openalex.org/I83205935"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. K. Vipparthi","raw_affiliation_strings":["Department of Computer Science and Engineering, Malaviya National Institute of Technology, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Malaviya National Institute of Technology, Jaipur, India","institution_ids":["https://openalex.org/I83205935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007967523","display_name":"Shailesh Garg","orcid":null},"institutions":[{"id":"https://openalex.org/I83205935","display_name":"Malaviya National Institute of Technology Jaipur","ror":"https://ror.org/0077k1j32","country_code":"IN","type":"education","lineage":["https://openalex.org/I83205935"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shailesh Garg","raw_affiliation_strings":["Department of Computer Science and Engineering, Malaviya National Institute of Technology, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Malaviya National Institute of Technology, Jaipur, India","institution_ids":["https://openalex.org/I83205935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050694272","display_name":"Shubham Singhal","orcid":"https://orcid.org/0000-0003-2779-9011"},"institutions":[{"id":"https://openalex.org/I83205935","display_name":"Malaviya National Institute of Technology Jaipur","ror":"https://ror.org/0077k1j32","country_code":"IN","type":"education","lineage":["https://openalex.org/I83205935"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shubham Singhal","raw_affiliation_strings":["Department of Computer Science and Engineering, Malaviya National Institute of Technology, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Malaviya National Institute of Technology, Jaipur, India","institution_ids":["https://openalex.org/I83205935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087943704","display_name":"Shubham Pancholi","orcid":null},"institutions":[{"id":"https://openalex.org/I83205935","display_name":"Malaviya National Institute of Technology Jaipur","ror":"https://ror.org/0077k1j32","country_code":"IN","type":"education","lineage":["https://openalex.org/I83205935"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shubham Pancholi","raw_affiliation_strings":["Department of Computer Science and Engineering, Malaviya National Institute of Technology, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Malaviya National Institute of Technology, Jaipur, India","institution_ids":["https://openalex.org/I83205935"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5014402833"],"corresponding_institution_ids":["https://openalex.org/I83205935"],"apc_list":null,"apc_paid":null,"fwci":1.1072,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.81052385,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"172","last_page":"178"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7833311557769775},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7496190071105957},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.6133900880813599},{"id":"https://openalex.org/keywords/protocol-stack","display_name":"Protocol stack","score":0.5583744645118713},{"id":"https://openalex.org/keywords/network-layer","display_name":"Network layer","score":0.4919867217540741},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4844389259815216},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.47017139196395874},{"id":"https://openalex.org/keywords/packet-drop-attack","display_name":"Packet drop attack","score":0.4523422122001648},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.44748812913894653},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.4301705062389374},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3976629078388214},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.3384573459625244},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.33743077516555786},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.28202933073043823},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.27518126368522644},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.1602967083454132},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10495525598526001},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09032085537910461}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7833311557769775},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7496190071105957},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.6133900880813599},{"id":"https://openalex.org/C38601921","wikidata":"https://www.wikidata.org/wiki/Q1757693","display_name":"Protocol stack","level":3,"score":0.5583744645118713},{"id":"https://openalex.org/C117468950","wikidata":"https://www.wikidata.org/wiki/Q208074","display_name":"Network layer","level":3,"score":0.4919867217540741},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4844389259815216},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.47017139196395874},{"id":"https://openalex.org/C35546906","wikidata":"https://www.wikidata.org/wiki/Q2900718","display_name":"Packet drop attack","level":5,"score":0.4523422122001648},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.44748812913894653},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4301705062389374},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3976629078388214},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.3384573459625244},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.33743077516555786},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.28202933073043823},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.27518126368522644},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.1602967083454132},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10495525598526001},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09032085537910461},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2018.8554471","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2018.8554471","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5799999833106995,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1551135924","https://openalex.org/W1598860363","https://openalex.org/W1968729698","https://openalex.org/W1971673042","https://openalex.org/W2008026848","https://openalex.org/W2014809464","https://openalex.org/W2043733271","https://openalex.org/W2105697588","https://openalex.org/W2124103816","https://openalex.org/W2144284297","https://openalex.org/W2148198165","https://openalex.org/W2187538447","https://openalex.org/W2241036117","https://openalex.org/W2325877089","https://openalex.org/W2588330434","https://openalex.org/W2606537796","https://openalex.org/W2963250256","https://openalex.org/W4285719527","https://openalex.org/W6635729401","https://openalex.org/W6678435446","https://openalex.org/W6690063056","https://openalex.org/W6733290428"],"related_works":["https://openalex.org/W2019121112","https://openalex.org/W2116396116","https://openalex.org/W1146749182","https://openalex.org/W1130949692","https://openalex.org/W133227787","https://openalex.org/W2154249443","https://openalex.org/W2004695235","https://openalex.org/W4237540462","https://openalex.org/W2347274291","https://openalex.org/W1583213063"],"abstract_inverted_index":{"The":[0],"existing":[1],"research":[2],"on":[3,11,15,87,125,182],"the":[4,38,47,57,76,115,151,155,192,199,203,208,217,225,228,237,247,258],"Internet":[5],"of":[6,24,49,55,67,93,104,145,157,202,257],"Things(IoT)":[7],"security":[8],"mainly":[9],"focuses":[10],"attack":[12,43,86,98,147,172,181],"and":[13,21,41,79,84,109,138,168,219,261],"defense":[14],"a":[16,64,82],"single":[17,65],"protocol":[18,68,184,205],"layer.":[19],"Increasing":[20],"ubiquitous":[22],"use":[23],"loT":[25],"also":[26,72],"makes":[27],"it":[28,220],"vulnerable":[29],"to":[30,36,63,74,102,154,206,213],"many":[31],"attacks.":[32,209],"An":[33],"attacker":[34],"try":[35,73],"performs":[37],"intelligent,":[39],"brutal":[40],"stealthy":[42],"that":[44,246],"can":[45,240],"reduce":[46],"risk":[48],"being":[50],"detected.":[51],"In":[52,160],"these":[53],"kinds":[54],"attacks,":[56,94],"attackers":[58],"not":[59],"only":[60],"restrict":[61],"themselves":[62],"layer":[66],"stack":[69],"but":[70],"they":[71],"decrease":[75],"network":[77,238,251],"performance":[78,252],"throughput":[80],"by":[81],"simultaneous":[83],"coordinated":[85],"different":[88],"layers.":[89,111],"A":[90],"new":[91],"class":[92],"termed":[95],"as":[96],"cross-layer":[97,126,146,171],"became":[99],"prominent":[100],"due":[101],"lack":[103],"interaction":[105],"between":[106],"MAC,":[107],"routing":[108],"upper":[110],"These":[112],"attacks":[113,127,249],"achieve":[114],"better":[116],"effect":[117],"with":[118],"reduced":[119],"cost.":[120],"Research":[121],"has":[122],"been":[123],"done":[124],"in":[128,148,173,216,224,233,255],"other":[129],"domains":[130],"like":[131],"Cognitive":[132],"Radio":[133],"Network(CRN),":[134],"Wireless":[135],"Sensor":[136],"Networks(WSN)":[137],"ad-hoc":[139],"networks.":[140],"However,":[141],"our":[142,158],"proposed":[143,165,248],"scheme":[144],"IoT":[149],"is":[150,211],"first":[152],"paper":[153],"best":[156],"knowledge.":[159],"this":[161],"paper,":[162],"we":[163,175],"have":[164,176,197],"Rank":[166,200,210],"Manipulation":[167],"Drop":[169],"Delay(RMDD)":[170],"loT,":[174],"investigated":[177],"how":[178],"small":[179],"intensity":[180],"Routing":[183],"for":[185],"low":[186],"power":[187],"lossy":[188],"networks":[189],"(RPL)":[190],"degrades":[191],"overall":[193],"application":[194],"throughput.":[195],"We":[196],"exploited":[198],"system":[201],"RPL":[204],"implement":[207],"given":[212],"each":[214],"node":[215],"graph,":[218],"shows":[221],"its":[222],"position":[223],"network.":[226],"If":[227],"rank":[229],"could":[230],"be":[231,241],"manipulated":[232],"some":[234],"manner,":[235],"then":[236],"topology":[239],"modified.":[242],"Simulation":[243],"results":[244],"demonstrate":[245],"degrade":[250],"very":[253],"much":[254],"terms":[256],"throughput,":[259],"latency,":[260],"connectivity.":[262]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
