Uploaded by Anand pokale

Energy Efficient Secured Trust-Based RPL Routing Protocol (1)

advertisement
Energy Efficient Secured TrustBased RPL Routing Protocol
by Deepika Reddy
Submission date: 01-May-2020 01:42PM (UTC+0530)
Submission ID: 1313009045
File name: final_paper.doc (2.06M)
Word count: 6161
Character count: 33536
Energy Efficient Secured Trust-Based RPL Routing Protocol
ORIGINALITY REPORT
67
%
SIMILARITY INDEX
53%
51%
32%
INTERNET SOURCES
PUBLICATIONS
STUDENT PAPERS
PRIMARY SOURCES
1
2
3
4
5
aut.researchgateway.ac.nz
Internet Source
www.gm.ece.cmu.edu
Internet Source
export.arxiv.org
Internet Source
www.mdpi.com
Internet Source
Sheeraz A. Alvi, Fakhar ul Hassan, Adnan Noor
Mian. "On the energy efficiency and stability of
RPL routing protocol", 2017 13th International
Wireless Communications and Mobile
Computing Conference (IWCMC), 2017
13%
10%
5%
4%
4%
Publication
6
"Detection and Prevention of Black Hole Attack
in RPL Protocol Based on the Threshold Value
of Nodes in the Internet of Things Networks",
International Journal of Innovative Technology
and Exploring Engineering, 2019
Publication
4%
7
8
9
10
eprints.whiterose.ac.uk
Internet Source
Submitted to University of Waikato
Student Paper
www.ukessays.com
Internet Source
Wenjian Wang, Renjian Feng, Min Zhu, Yinfeng
Wu, Yadong Liu, Yafeng Ye. "Security-aware
Localized Topology Control Algorithm for Mobile
Ad-hoc Networks", Journal of Physics:
Conference Series, 2019
3%
3%
3%
3%
Publication
11
12
13
www.ijarcsse.com
Internet Source
elaineshi.com
Internet Source
Andreas P. Plageras, Kostas E. Psannis,
Christos Stergiou, Haoxiang Wang, B.B. Gupta.
"Efficient IoT-based sensor BIG Data collection–
processing and analysis in smart buildings",
Future Generation Computer Systems, 2018
2%
2%
2%
Publication
14
www.napier.ac.uk
Internet Source
Rajwinder Kaur, Karan Verma, Shelendra
1%
15
Kumar Jain, Nishtha Kesswani. "Efficient
Routing Protocol for Location Privacy Preserving
in Internet of Things", International Journal of
Information Security and Privacy, 2019
1%
Publication
16
17
18
19
20
repository.cmu.edu
Internet Source
ijarcsse.com
Internet Source
sce.uhcl.edu
Internet Source
www.inass.org
Internet Source
Harith Kharrufa, Hayder A. A. Al-Kashoash,
Andrew H. Kemp. "RPL-Based Routing
Protocols in IoT Applications: A Review", IEEE
Sensors Journal, 2019
1%
1%
1%
1%
1%
Publication
21
22
23
24
moss.csc.ncsu.edu
Internet Source
docshare.tips
Internet Source
Submitted to University of Leeds
Student Paper
www.gta.ufrj.br
<1%
<1%
<1%
25
Internet Source
<1%
Ahmed Raoof, Ashraf Matrawy, Chung-Horng
Lung. "Routing Attacks and Mitigation Methods
for RPL-Based Internet of Things", IEEE
Communications Surveys & Tutorials, 2019
<1%
Publication
26
27
28
ijaegt.com
Internet Source
Submitted to City University of Hong Kong
Student Paper
Anitha, P., G. N. Pavithra, and P. S. Periasamy.
"An improved security mechanism for highthroughput multicast routing in wireless mesh
networks against Sybil attack", International
Conference on Pattern Recognition Informatics
and Medical Engineering (PRIME-2012), 2012.
<1%
<1%
<1%
Publication
29
30
31
32
link.springer.com
Internet Source
Submitted to Middlesex University
Student Paper
Submitted to Institute of Graduate Studies, UiTM
Student Paper
discovery.ucl.ac.uk
<1%
<1%
<1%
33
Internet Source
<1%
Ahmed Raoof, Ashraf Matrawy, Chung-Horng
Lung. "Secure Routing in IoT: Evaluation of
RPL's Secure Mode under Attacks", 2019 IEEE
Global Communications Conference
(GLOBECOM), 2019
<1%
Publication
34
Submitted to University of Science and
Technology
<1%
Student Paper
35
"Advances in Computer Science and Ubiquitous
Computing", Springer Science and Business
Media LLC, 2017
<1%
Publication
36
"Intelligent Systems Design and Applications",
Springer Science and Business Media LLC,
2020
<1%
Publication
37
Submitted to Indian Institute of Technology,
Ropar
<1%
Student Paper
38
Adrian Perrig. "The sybil attack in sensor
networks", Proceedings of the third international
symposium on Information processing in sensor
networks - IPSN 04 IPSN 04, 2004
Publication
<1%
39
Submitted to Asian Institute of Technology
Student Paper
Exclude quotes
On
Exclude bibliography
On
Exclude matches
< 5 words
<1%
Download