{"id":"https://openalex.org/W4402205873","doi":"https://doi.org/10.1186/s42400-024-00223-x","title":"FLSec-RPL: a fuzzy logic-based intrusion detection scheme for securing RPL-based IoT networks against DIO neighbor suppression attacks","display_name":"FLSec-RPL: a fuzzy logic-based intrusion detection scheme for securing RPL-based IoT networks against DIO neighbor suppression attacks","publication_year":2024,"publication_date":"2024-09-03","ids":{"openalex":"https://openalex.org/W4402205873","doi":"https://doi.org/10.1186/s42400-024-00223-x"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00223-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00223-x","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00223-x","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00223-x","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Chenset Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I179193067","display_name":"Khon Kaen University","ror":"https://ror.org/03cq4gr50","country_code":"TH","type":"education","lineage":["https://openalex.org/I179193067"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Chenset Kim","raw_affiliation_strings":["Applied Network Technology (ANT), Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, 40002, Thailand"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Applied Network Technology (ANT), Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, 40002, Thailand","institution_ids":["https://openalex.org/I179193067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055624785","display_name":"Chakchai So\u2013In","orcid":"https://orcid.org/0000-0003-1026-191X"},"institutions":[{"id":"https://openalex.org/I179193067","display_name":"Khon Kaen University","ror":"https://ror.org/03cq4gr50","country_code":"TH","type":"education","lineage":["https://openalex.org/I179193067"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Chakchai So-In","raw_affiliation_strings":["Applied Network Technology (ANT), Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, 40002, Thailand"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Applied Network Technology (ANT), Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, 40002, Thailand","institution_ids":["https://openalex.org/I179193067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000349603","display_name":"Yanika Kongsorot","orcid":"https://orcid.org/0000-0002-2603-0879"},"institutions":[{"id":"https://openalex.org/I179193067","display_name":"Khon Kaen University","ror":"https://ror.org/03cq4gr50","country_code":"TH","type":"education","lineage":["https://openalex.org/I179193067"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Yanika Kongsorot","raw_affiliation_strings":["Advanced Intelligent Interdisciplinary Integration (AIII), Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, 40002, Thailand"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Advanced Intelligent Interdisciplinary Integration (AIII), Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, 40002, Thailand","institution_ids":["https://openalex.org/I179193067"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039240662","display_name":"Phet Aimtongkham","orcid":"https://orcid.org/0000-0001-5289-1149"},"institutions":[{"id":"https://openalex.org/I179193067","display_name":"Khon Kaen University","ror":"https://ror.org/03cq4gr50","country_code":"TH","type":"education","lineage":["https://openalex.org/I179193067"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Phet Aimtongkham","raw_affiliation_strings":["Applied Network Technology (ANT), Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, 40002, Thailand"],"raw_orcid":"https://orcid.org/0000-0001-5289-1149","affiliations":[{"raw_affiliation_string":"Applied Network Technology (ANT), Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, 40002, Thailand","institution_ids":["https://openalex.org/I179193067"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I179193067"],"apc_list":null,"apc_paid":null,"fwci":4.0368,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.94430773,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"7","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7025051116943359},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6477980017662048},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.6336431503295898},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6034725308418274},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5724921822547913},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4515893757343292},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32342642545700073},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16103479266166687},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15182149410247803}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7025051116943359},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6477980017662048},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.6336431503295898},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6034725308418274},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5724921822547913},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4515893757343292},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32342642545700073},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16103479266166687},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15182149410247803},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00223-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00223-x","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00223-x","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9bee6ccdcf1f4db8821e556dd839e407","is_oa":true,"landing_page_url":"https://doaj.org/article/9bee6ccdcf1f4db8821e556dd839e407","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 7, Iss 1, Pp 1-28 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00223-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00223-x","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00223-x","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322335","display_name":"Khon Kaen University","ror":"https://ror.org/03cq4gr50"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4402205873.pdf"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W49085352","https://openalex.org/W1518337906","https://openalex.org/W1548644355","https://openalex.org/W1968729698","https://openalex.org/W1974200887","https://openalex.org/W1976262362","https://openalex.org/W2105532535","https://openalex.org/W2113678645","https://openalex.org/W2125555950","https://openalex.org/W2134295053","https://openalex.org/W2170780561","https://openalex.org/W2274012241","https://openalex.org/W2298500030","https://openalex.org/W2325877089","https://openalex.org/W2370696599","https://openalex.org/W2604778462","https://openalex.org/W2744442622","https://openalex.org/W2799824533","https://openalex.org/W2890687407","https://openalex.org/W2904959125","https://openalex.org/W2927044290","https://openalex.org/W2962803161","https://openalex.org/W2980801064","https://openalex.org/W2982051412","https://openalex.org/W3005367885","https://openalex.org/W3006589602","https://openalex.org/W3009103980","https://openalex.org/W3026777061","https://openalex.org/W3028814032","https://openalex.org/W3097651535","https://openalex.org/W3122598275","https://openalex.org/W3185457508","https://openalex.org/W3210829596","https://openalex.org/W4205816507","https://openalex.org/W4205946811","https://openalex.org/W4319460182"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660"],"abstract_inverted_index":{"Abstract":[0],"The":[1,16,252],"Internet":[2],"of":[3,21,89,167,223,242,248,263],"Things":[4],"(IoT)":[5],"has":[6,28],"gained":[7],"popularity":[8],"and":[9,34,45,68,78,98,115,124,130,195,202,210,217,235,273],"is":[10,165],"widely":[11],"used":[12],"in":[13,18,57,127,261],"modern":[14],"society.":[15],"growth":[17],"the":[19,40,154,221,240,249,264],"sizes":[20],"IoT":[22,55,106],"networks":[23,47,59,135],"with":[24,62,246],"more":[25],"internet-connected":[26],"devices":[27,56],"led":[29],"to":[30,39,74,104,152,158,178,190,205],"concerns":[31],"regarding":[32],"privacy":[33],"security.":[35],"In":[36,140],"particular,":[37],"related":[38],"routing":[41],"protocol":[42,156],"for":[43,113],"low-power":[44],"lossy":[46],"(RPL),":[48],"which":[49],"lacks":[50],"robust":[51],"security":[52,102],"functions,":[53],"many":[54],"RPL":[58,134,155],"are":[60,214],"resource-constrained,":[61],"limited":[63],"computing":[64],"power,":[65],"bandwidth,":[66],"memory,":[67],"battery":[69],"life.":[70],"This":[71,87],"causes":[72],"them":[73],"face":[75],"various":[76],"vulnerabilities":[77],"potential":[79,180],"attacks,":[80],"such":[81],"as":[82],"DIO":[83,96],"neighbor":[84,193],"suppression":[85],"attacks.":[86],"type":[88],"attack":[90,138,175],"specifically":[91],"targets":[92],"neighboring":[93],"nodes":[94,213],"through":[95],"messages":[97],"poses":[99],"a":[100,145,199],"significant":[101],"threat":[103],"RPL-based":[105],"networks.":[107,237],"Recent":[108],"studies":[109],"have":[110],"proposed":[111,244],"methods":[112,260],"detecting":[114],"mitigating":[116],"this":[117,137,141,161],"attack;":[118],"however,":[119],"they":[120],"produce":[121],"high":[122],"false-positive":[123],"false-negative":[125],"rates":[126],"detection":[128,150,189,200,265],"tasks":[129],"cannot":[131],"fully":[132],"protect":[133,159],"against":[136,160],"type.":[139],"paper,":[142],"we":[143,226],"propose":[144],"novel":[146],"fuzzy":[147,186],"logic-based":[148,187],"intrusion":[149,188],"scheme":[151],"secure":[153],"(FLSec-RPL)":[157],"attack.":[162],"Our":[163],"method":[164,245,257],"built":[166],"three":[168],"key":[169],"phases":[170],"consecutively:":[171],"(1)":[172],"it":[173,184,197],"tracks":[174],"activity":[176],"variables":[177],"determine":[179],"malicious":[181,192,209,212],"behaviors;":[182],"(2)":[183],"performs":[185],"identify":[191],"nodes;":[194],"(3)":[196],"provides":[198],"validation":[201],"blocking":[203],"mechanism":[204],"ensure":[206],"that":[207,247,255],"both":[208],"suspected":[211],"accurately":[215],"detected":[216],"blocked.":[218],"To":[219],"evaluate":[220],"effectiveness":[222],"our":[224,243,256],"method,":[225],"conduct":[227],"comprehensive":[228],"experiments":[229],"across":[230],"diverse":[231],"scenarios,":[232],"including":[233],"Static-RPL":[234],"Mobile-RPL":[236],"We":[238],"compare":[239],"performance":[241],"state-of-the-art":[250],"methods.":[251],"results":[253],"demonstrate":[254],"outperforms":[258],"existing":[259],"terms":[262],"accuracy,":[266],"F1":[267],"score,":[268],"power":[269],"consumption,":[270],"end-to-end":[271],"delay,":[272],"packet":[274],"delivery":[275],"ratio":[276],"metrics.":[277]},"counts_by_year":[{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-11T06:11:40.159057","created_date":"2025-10-10T00:00:00"}
