{"id":"https://openalex.org/W4400908543","doi":"https://doi.org/10.1109/siu61531.2024.10600756","title":"A DIS Attack Resistant Algorithm for RPL Routing Protocol in 6TiSCH Networks","display_name":"A DIS Attack Resistant Algorithm for RPL Routing Protocol in 6TiSCH Networks","publication_year":2024,"publication_date":"2024-05-15","ids":{"openalex":"https://openalex.org/W4400908543","doi":"https://doi.org/10.1109/siu61531.2024.10600756"},"language":"en","primary_location":{"id":"doi:10.1109/siu61531.2024.10600756","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/siu61531.2024.10600756","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 32nd Signal Processing and Communications Applications Conference (SIU)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057010979","display_name":"Hakan Ayd\u0131n","orcid":"https://orcid.org/0000-0002-0122-8512"},"institutions":[{"id":"https://openalex.org/I162720556","display_name":"Karadeniz Technical University","ror":"https://ror.org/03z8fyr40","country_code":"TR","type":"education","lineage":["https://openalex.org/I162720556"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Hakan Ayd\u0131n","raw_affiliation_strings":["Karadeniz Technical University,Computer Engineering Department,Trabzon,Turkey"],"affiliations":[{"raw_affiliation_string":"Karadeniz Technical University,Computer Engineering Department,Trabzon,Turkey","institution_ids":["https://openalex.org/I162720556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101524898","display_name":"Burak Ayd\u0131n","orcid":"https://orcid.org/0000-0002-5377-4590"},"institutions":[{"id":"https://openalex.org/I162720556","display_name":"Karadeniz Technical University","ror":"https://ror.org/03z8fyr40","country_code":"TR","type":"education","lineage":["https://openalex.org/I162720556"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Burak Ayd\u0131n","raw_affiliation_strings":["Karadeniz Technical University,Computer Engineering Department,Trabzon,Turkey"],"affiliations":[{"raw_affiliation_string":"Karadeniz Technical University,Computer Engineering Department,Trabzon,Turkey","institution_ids":["https://openalex.org/I162720556"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5057010979"],"corresponding_institution_ids":["https://openalex.org/I162720556"],"apc_list":null,"apc_paid":null,"fwci":0.3663,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.592008,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9448999762535095,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9448999762535095,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9302999973297119,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6685177087783813},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5548360347747803},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.5237369537353516},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4976847469806671},{"id":"https://openalex.org/keywords/routing-algorithm","display_name":"Routing algorithm","score":0.4299961030483246},{"id":"https://openalex.org/keywords/zone-routing-protocol","display_name":"Zone Routing Protocol","score":0.4242885112762451},{"id":"https://openalex.org/keywords/dynamic-source-routing","display_name":"Dynamic Source Routing","score":0.28891459107398987}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6685177087783813},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5548360347747803},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.5237369537353516},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4976847469806671},{"id":"https://openalex.org/C2984173633","wikidata":"https://www.wikidata.org/wiki/Q22725","display_name":"Routing algorithm","level":4,"score":0.4299961030483246},{"id":"https://openalex.org/C189884158","wikidata":"https://www.wikidata.org/wiki/Q8073926","display_name":"Zone Routing Protocol","level":5,"score":0.4242885112762451},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.28891459107398987}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/siu61531.2024.10600756","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/siu61531.2024.10600756","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 32nd Signal Processing and Communications Applications Conference (SIU)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2396774947","https://openalex.org/W2923295664","https://openalex.org/W2543936869","https://openalex.org/W2121162866","https://openalex.org/W2126842185","https://openalex.org/W2051592939","https://openalex.org/W1972673736","https://openalex.org/W2546592407","https://openalex.org/W2008974667","https://openalex.org/W3022598921"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"an":[3],"effective":[4],"solution":[5,71],"against":[6],"DIS":[7,37,74],"attacks":[8,75],"in":[9,24],"RPL-based":[10],"6TiSCH":[11,13],"networks.":[12,30],"is":[14,49],"a":[15],"protocol":[16],"designed":[17],"to":[18,55,86],"support":[19],"reliable":[20],"and":[21,27,46,79],"synchronised":[22],"communication":[23],"low":[25],"power":[26],"resource":[28,40],"limited":[29],"In":[31],"this":[32],"study,":[33],"the":[34,69],"impact":[35],"of":[36,59],"packets":[38],"on":[39],"wastage":[41],"by":[42,61],"considering":[43],"buffer":[44,83],"occupancy":[45],"shared":[47],"slots":[48],"analysed.":[50],"The":[51],"proposed":[52,70],"method":[53],"aims":[54],"prevent":[56],"malicious":[57],"activities":[58],"attackers":[60],"detecting":[62],"attacks.":[63],"Simulation":[64],"studies":[65],"have":[66],"shown":[67],"that":[68],"can":[72],"detect":[73],"52%":[76],"more":[77],"successfully":[78],"has":[80],"51.6%":[81],"less":[82],"consumption":[84],"compared":[85],"Verma":[87],"et":[88],"al.":[89]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
