{"id":"https://openalex.org/W4392546216","doi":"https://doi.org/10.1145/3638837.3638860","title":"Analysis of Version Number Attack using Multiple RPL Instances","display_name":"Analysis of Version Number Attack using Multiple RPL Instances","publication_year":2023,"publication_date":"2023-12-15","ids":{"openalex":"https://openalex.org/W4392546216","doi":"https://doi.org/10.1145/3638837.3638860"},"language":"en","primary_location":{"id":"doi:10.1145/3638837.3638860","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3638837.3638860","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3638837.3638860","source":null,"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 12th International Conference on Networks, Communication and Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3638837.3638860","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094088819","display_name":"Tawbah Ennab","orcid":"https://orcid.org/0009-0003-3407-9079"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Tawbah Ennab","raw_affiliation_strings":["Jordan University of Science and Technology, Jordan"],"affiliations":[{"raw_affiliation_string":"Jordan University of Science and Technology, Jordan","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066703648","display_name":"Yaser Khamayseh","orcid":"https://orcid.org/0000-0002-8334-3281"},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Yaser Khamayseh","raw_affiliation_strings":["College of Technological Innovation , Zayed University, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"College of Technological Innovation , Zayed University, United Arab Emirates","institution_ids":["https://openalex.org/I91044093"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035255550","display_name":"Wail Mardini","orcid":"https://orcid.org/0000-0002-4840-2290"},"institutions":[{"id":"https://openalex.org/I73094659","display_name":"Culver Stockton College","ror":"https://ror.org/00n855a93","country_code":"US","type":"education","lineage":["https://openalex.org/I73094659"]},{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO","US"],"is_corresponding":false,"raw_author_name":"Wail Mardini","raw_affiliation_strings":["Houston Christian University, USA and \rJordan University of Science and Technology, Jordan"],"affiliations":[{"raw_affiliation_string":"Houston Christian University, USA and \rJordan University of Science and Technology, Jordan","institution_ids":["https://openalex.org/I156983542","https://openalex.org/I73094659"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055658968","display_name":"Yu Shen","orcid":"https://orcid.org/0000-0003-4699-0006"},"institutions":[{"id":"https://openalex.org/I153718931","display_name":"University of Ottawa","ror":"https://ror.org/03c4mmv16","country_code":"CA","type":"education","lineage":["https://openalex.org/I153718931"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Yu Shen","raw_affiliation_strings":["University of Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"University of Ottawa, Canada","institution_ids":["https://openalex.org/I153718931"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003131477","display_name":"Burak Kantarc\u0131","orcid":"https://orcid.org/0000-0003-0220-7956"},"institutions":[{"id":"https://openalex.org/I153718931","display_name":"University of Ottawa","ror":"https://ror.org/03c4mmv16","country_code":"CA","type":"education","lineage":["https://openalex.org/I153718931"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Burak Kantarci","raw_affiliation_strings":["University of Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"University of Ottawa, Canada","institution_ids":["https://openalex.org/I153718931"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5094088819"],"corresponding_institution_ids":["https://openalex.org/I156983542"],"apc_list":null,"apc_paid":null,"fwci":0.2007,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.50644122,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"6","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6280069351196289}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6280069351196289}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3638837.3638860","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3638837.3638860","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3638837.3638860","source":null,"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 12th International Conference on Networks, Communication and Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3638837.3638860","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3638837.3638860","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3638837.3638860","source":null,"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 12th International Conference on Networks, Communication and Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7496918372","display_name":null,"funder_award_id":"R22051","funder_id":"https://openalex.org/F4320325295","funder_display_name":"Zayed University"}],"funders":[{"id":"https://openalex.org/F4320325295","display_name":"Zayed University","ror":"https://ror.org/03snqfa66"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4392546216.pdf","grobid_xml":"https://content.openalex.org/works/W4392546216.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W1954338761","https://openalex.org/W1968729698","https://openalex.org/W2077950844","https://openalex.org/W2097020578","https://openalex.org/W2111619626","https://openalex.org/W2169810359","https://openalex.org/W2235546383","https://openalex.org/W2278028801","https://openalex.org/W2279929312","https://openalex.org/W2281666703","https://openalex.org/W2304976378","https://openalex.org/W2325877089","https://openalex.org/W2460667315","https://openalex.org/W2537647578","https://openalex.org/W2770564120","https://openalex.org/W2778355957","https://openalex.org/W2781902134","https://openalex.org/W2785446263","https://openalex.org/W2785903266","https://openalex.org/W2788700207","https://openalex.org/W2885520469","https://openalex.org/W2889159103","https://openalex.org/W2907587771","https://openalex.org/W2946805489","https://openalex.org/W3027482823","https://openalex.org/W3083526674","https://openalex.org/W3088648069","https://openalex.org/W3106059286","https://openalex.org/W3135316855","https://openalex.org/W6639557410","https://openalex.org/W6697138717"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"The":[0,79,109,124],"Routing":[1],"Protocol":[2],"for":[3,16,194],"Low-Power":[4],"and":[5,33,101,147,152,171],"Lossy":[6],"Networks":[7,21],"(RPL)":[8],"has":[9,37],"become":[10],"the":[11,72,86,93,96,103,114,119,138,150,153,156,160,176,179,189,205,215],"de":[12],"facto":[13],"routing":[14],"scheme":[15],"Low-Rate":[17],"Wireless":[18],"Personal":[19],"Area":[20],"(LR-WPANs).":[22],"Attacks":[23],"on":[24],"networks":[25],"are":[26],"divided":[27],"into":[28],"two":[29],"types:":[30],"external":[31,44],"attacks":[32],"internal":[34,52,60],"attacks.":[35,45,53],"RPL":[36,126,130,139,158],"security":[38],"mechanisms":[39],"to":[40,51,92,137,143,148,174],"protect":[41],"it":[42,47],"against":[43],"However,":[46],"is":[48,58,82,99,141],"still":[49],"vulnerable":[50],"Version":[54,68],"Number":[55,69],"attack":[56,62,70],"(VN)":[57],"an":[59,65,106],"integrity":[61],"caused":[63],"by":[64,117,122,209],"insider":[66],"node.":[67],"modifies":[71],"DODAG":[73,97],"Information":[74],"Object":[75],"(DIO)":[76],"control":[77,88],"messages.":[78],"version":[80,115,161],"number":[81,116,162],"a":[83,128,135],"field":[84],"in":[85,212],"DIO":[87],"message":[89],"that":[90,95],"announces":[91],"nodes":[94],"tree":[98],"updated":[100],"keeps":[102],"network":[104,191,196],"from":[105],"obsolete":[107],"state.":[108],"root":[110],"node":[111],"only":[112],"updates":[113],"incrementing":[118],"current":[120],"value":[121],"one.":[123],"standard":[125],"uses":[127],"single":[129],"instance.":[131],"In":[132],"this":[133],"work,":[134],"modification":[136],"architecture":[140],"performed":[142],"support":[144],"multiple":[145],"instances":[146],"examine":[149],"effect":[151],"behavior":[154],"of":[155,178,214],"multi-instances":[157],"under":[159,168],"attack.":[163],"Extensive":[164],"experiments":[165],"were":[166],"conducted":[167],"Contiki":[169],"OS":[170],"Cooja":[172],"simulator":[173],"evaluate":[175],"performance":[177,192],"suggested":[180],"approach.":[181],"Packet":[182],"Delivery":[183],"Ratio":[184],"(PDR)":[185],"was":[186],"used":[187],"as":[188],"primary":[190],"metric":[193],"various":[195],"topologies.":[197],"Using":[198],"MRHOF":[199],"or":[200],"mixed":[201],"objective":[202],"functions":[203],"improved":[204],"packet":[206],"delivery":[207],"ratio":[208],"about":[210],"60-65%":[211],"most":[213],"cases.":[216]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
