A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things Article Swipe
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.3390/s22187052
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with the increase in the number of IoT applications and devices globally. To address routing attacks in RPL-based IoT, several security solutions have been proposed in literature, such as machine learning techniques, intrusion detection systems, and trust-based approaches. Studies show that trust-based security for IoT is feasible due to its simple integration and resource-constrained nature of smart devices. Existing trust-based solutions have insufficient consideration of nodes’ mobility and are not evaluated for dynamic scenarios to satisfy the requirements of smart applications. This research work addresses the Rank and Blackhole attacks in RPL considering the static as well as mobile nodes in IoT. The proposed Security, Mobility, and Trust-based model (SMTrust) relies on carefully chosen trust factors and metrics, including mobility-based metrics. The evaluation of the proposed model through simulation experiments shows that SMTrust performs better than the existing trust-based methods for securing RPL. The improvisation in terms of topology stability is 46%, reduction in packet loss rate is 45%, and 35% increase in throughput, with only 2.3% increase in average power consumption.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.3390/s22187052
- https://www.mdpi.com/1424-8220/22/18/7052/pdf?version=1663562167
- OA Status
- gold
- Cited By
- 52
- References
- 52
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4296366304
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4296366304Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.3390/s22187052Digital Object Identifier
- Title
-
A Trust-Based Model for Secure Routing against RPL Attacks in Internet of ThingsWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2022Year of publication
- Publication date
-
2022-09-17Full publication date if available
- Authors
-
Syeda Mariam Muzammal, Raja Kumar Murugesan, N. Z. Jhanjhi, Mamoona Humayun, Ashraf Osman Ibrahim, Abdelzahir AbdelmaboudList of authors in order
- Landing page
-
https://doi.org/10.3390/s22187052Publisher landing page
- PDF URL
-
https://www.mdpi.com/1424-8220/22/18/7052/pdf?version=1663562167Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://www.mdpi.com/1424-8220/22/18/7052/pdf?version=1663562167Direct OA link when available
- Concepts
-
Computer science, Routing (electronic design automation), Routing protocol, Computer network, Throughput, Internet of Things, Network packet, Intrusion detection system, Mobility model, Trust management (information system), Computer security, Wireless, TelecommunicationsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
52Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 19, 2024: 17, 2023: 13, 2022: 3Per-year citation counts (last 5 years)
- References (count)
-
52Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4296366304 |
|---|---|
| doi | https://doi.org/10.3390/s22187052 |
| ids.doi | https://doi.org/10.3390/s22187052 |
| ids.pmid | https://pubmed.ncbi.nlm.nih.gov/36146400 |
| ids.openalex | https://openalex.org/W4296366304 |
| fwci | 11.14057073 |
| type | article |
| title | A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things |
| awards[0].id | https://openalex.org/G2329097622 |
| awards[0].funder_id | https://openalex.org/F4320324433 |
| awards[0].display_name | |
| awards[0].funder_award_id | RGP.2/111/43 |
| awards[0].funder_display_name | King Khalid University |
| biblio.issue | 18 |
| biblio.volume | 22 |
| biblio.last_page | 7052 |
| biblio.first_page | 7052 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9997000098228455 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T10273 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9987000226974487 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | IoT and Edge/Fog Computing |
| topics[2].id | https://openalex.org/T11498 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9987000226974487 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Security in Wireless Sensor Networks |
| funders[0].id | https://openalex.org/F4320324433 |
| funders[0].ror | https://ror.org/052kwzs30 |
| funders[0].display_name | King Khalid University |
| is_xpac | False |
| apc_list.value | 2400 |
| apc_list.currency | CHF |
| apc_list.value_usd | 2598 |
| apc_paid.value | 2400 |
| apc_paid.currency | CHF |
| apc_paid.value_usd | 2598 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.7729928493499756 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C74172769 |
| concepts[1].level | 2 |
| concepts[1].score | 0.5878520607948303 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q1446839 |
| concepts[1].display_name | Routing (electronic design automation) |
| concepts[2].id | https://openalex.org/C104954878 |
| concepts[2].level | 3 |
| concepts[2].score | 0.5800298452377319 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1648707 |
| concepts[2].display_name | Routing protocol |
| concepts[3].id | https://openalex.org/C31258907 |
| concepts[3].level | 1 |
| concepts[3].score | 0.5774244070053101 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[3].display_name | Computer network |
| concepts[4].id | https://openalex.org/C157764524 |
| concepts[4].level | 3 |
| concepts[4].score | 0.537423849105835 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1383412 |
| concepts[4].display_name | Throughput |
| concepts[5].id | https://openalex.org/C81860439 |
| concepts[5].level | 2 |
| concepts[5].score | 0.4881230294704437 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q251212 |
| concepts[5].display_name | Internet of Things |
| concepts[6].id | https://openalex.org/C158379750 |
| concepts[6].level | 2 |
| concepts[6].score | 0.4812333583831787 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q214111 |
| concepts[6].display_name | Network packet |
| concepts[7].id | https://openalex.org/C35525427 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4614049792289734 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[7].display_name | Intrusion detection system |
| concepts[8].id | https://openalex.org/C191485582 |
| concepts[8].level | 2 |
| concepts[8].score | 0.45533105731010437 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q6887309 |
| concepts[8].display_name | Mobility model |
| concepts[9].id | https://openalex.org/C2776384856 |
| concepts[9].level | 2 |
| concepts[9].score | 0.4319709539413452 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q17145767 |
| concepts[9].display_name | Trust management (information system) |
| concepts[10].id | https://openalex.org/C38652104 |
| concepts[10].level | 1 |
| concepts[10].score | 0.41551274061203003 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[10].display_name | Computer security |
| concepts[11].id | https://openalex.org/C555944384 |
| concepts[11].level | 2 |
| concepts[11].score | 0.18493375182151794 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q249 |
| concepts[11].display_name | Wireless |
| concepts[12].id | https://openalex.org/C76155785 |
| concepts[12].level | 1 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[12].display_name | Telecommunications |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.7729928493499756 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/routing |
| keywords[1].score | 0.5878520607948303 |
| keywords[1].display_name | Routing (electronic design automation) |
| keywords[2].id | https://openalex.org/keywords/routing-protocol |
| keywords[2].score | 0.5800298452377319 |
| keywords[2].display_name | Routing protocol |
| keywords[3].id | https://openalex.org/keywords/computer-network |
| keywords[3].score | 0.5774244070053101 |
| keywords[3].display_name | Computer network |
| keywords[4].id | https://openalex.org/keywords/throughput |
| keywords[4].score | 0.537423849105835 |
| keywords[4].display_name | Throughput |
| keywords[5].id | https://openalex.org/keywords/internet-of-things |
| keywords[5].score | 0.4881230294704437 |
| keywords[5].display_name | Internet of Things |
| keywords[6].id | https://openalex.org/keywords/network-packet |
| keywords[6].score | 0.4812333583831787 |
| keywords[6].display_name | Network packet |
| keywords[7].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[7].score | 0.4614049792289734 |
| keywords[7].display_name | Intrusion detection system |
| keywords[8].id | https://openalex.org/keywords/mobility-model |
| keywords[8].score | 0.45533105731010437 |
| keywords[8].display_name | Mobility model |
| keywords[9].id | https://openalex.org/keywords/trust-management |
| keywords[9].score | 0.4319709539413452 |
| keywords[9].display_name | Trust management (information system) |
| keywords[10].id | https://openalex.org/keywords/computer-security |
| keywords[10].score | 0.41551274061203003 |
| keywords[10].display_name | Computer security |
| keywords[11].id | https://openalex.org/keywords/wireless |
| keywords[11].score | 0.18493375182151794 |
| keywords[11].display_name | Wireless |
| language | en |
| locations[0].id | doi:10.3390/s22187052 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S101949793 |
| locations[0].source.issn | 1424-8220 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1424-8220 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Sensors |
| locations[0].source.host_organization | https://openalex.org/P4310310987 |
| locations[0].source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310310987 |
| locations[0].source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://www.mdpi.com/1424-8220/22/18/7052/pdf?version=1663562167 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Sensors |
| locations[0].landing_page_url | https://doi.org/10.3390/s22187052 |
| locations[1].id | pmid:36146400 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306525036 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | PubMed |
| locations[1].source.host_organization | https://openalex.org/I1299303238 |
| locations[1].source.host_organization_name | National Institutes of Health |
| locations[1].source.host_organization_lineage | https://openalex.org/I1299303238 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | publishedVersion |
| locations[1].raw_type | |
| locations[1].license_id | |
| locations[1].is_accepted | True |
| locations[1].is_published | True |
| locations[1].raw_source_name | Sensors (Basel, Switzerland) |
| locations[1].landing_page_url | https://pubmed.ncbi.nlm.nih.gov/36146400 |
| locations[2].id | pmh:oai:doaj.org/article:2420c51c31bc42129aae91e4cc603897 |
| locations[2].is_oa | True |
| locations[2].source.id | https://openalex.org/S4306401280 |
| locations[2].source.issn | |
| locations[2].source.type | repository |
| locations[2].source.is_oa | False |
| locations[2].source.issn_l | |
| locations[2].source.is_core | False |
| locations[2].source.is_in_doaj | False |
| locations[2].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[2].source.host_organization | |
| locations[2].source.host_organization_name | |
| locations[2].license | cc-by-sa |
| locations[2].pdf_url | |
| locations[2].version | submittedVersion |
| locations[2].raw_type | article |
| locations[2].license_id | https://openalex.org/licenses/cc-by-sa |
| locations[2].is_accepted | False |
| locations[2].is_published | False |
| locations[2].raw_source_name | Sensors, Vol 22, Iss 18, p 7052 (2022) |
| locations[2].landing_page_url | https://doaj.org/article/2420c51c31bc42129aae91e4cc603897 |
| locations[3].id | pmh:oai:mdpi.com:/1424-8220/22/18/7052/ |
| locations[3].is_oa | True |
| locations[3].source.id | https://openalex.org/S4306400947 |
| locations[3].source.issn | |
| locations[3].source.type | repository |
| locations[3].source.is_oa | True |
| locations[3].source.issn_l | |
| locations[3].source.is_core | False |
| locations[3].source.is_in_doaj | False |
| locations[3].source.display_name | MDPI (MDPI AG) |
| locations[3].source.host_organization | https://openalex.org/I4210097602 |
| locations[3].source.host_organization_name | Multidisciplinary Digital Publishing Institute (Switzerland) |
| locations[3].source.host_organization_lineage | https://openalex.org/I4210097602 |
| locations[3].license | cc-by |
| locations[3].pdf_url | |
| locations[3].version | submittedVersion |
| locations[3].raw_type | Text |
| locations[3].license_id | https://openalex.org/licenses/cc-by |
| locations[3].is_accepted | False |
| locations[3].is_published | False |
| locations[3].raw_source_name | Sensors; Volume 22; Issue 18; Pages: 7052 |
| locations[3].landing_page_url | https://dx.doi.org/10.3390/s22187052 |
| locations[4].id | pmh:oai:pubmedcentral.nih.gov:9506070 |
| locations[4].is_oa | True |
| locations[4].source.id | https://openalex.org/S2764455111 |
| locations[4].source.issn | |
| locations[4].source.type | repository |
| locations[4].source.is_oa | False |
| locations[4].source.issn_l | |
| locations[4].source.is_core | False |
| locations[4].source.is_in_doaj | False |
| locations[4].source.display_name | PubMed Central |
| locations[4].source.host_organization | https://openalex.org/I1299303238 |
| locations[4].source.host_organization_name | National Institutes of Health |
| locations[4].source.host_organization_lineage | https://openalex.org/I1299303238 |
| locations[4].license | other-oa |
| locations[4].pdf_url | |
| locations[4].version | submittedVersion |
| locations[4].raw_type | Text |
| locations[4].license_id | https://openalex.org/licenses/other-oa |
| locations[4].is_accepted | False |
| locations[4].is_published | False |
| locations[4].raw_source_name | Sensors (Basel) |
| locations[4].landing_page_url | https://www.ncbi.nlm.nih.gov/pmc/articles/9506070 |
| indexed_in | crossref, doaj, pubmed |
| authorships[0].author.id | https://openalex.org/A5065807238 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-2960-1814 |
| authorships[0].author.display_name | Syeda Mariam Muzammal |
| authorships[0].countries | PK |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I200749728 |
| authorships[0].affiliations[0].raw_affiliation_string | University Institute of Information Technology, PMAS Arid Agriculture University, Rawalpindi 46000, Pakistan |
| authorships[0].institutions[0].id | https://openalex.org/I200749728 |
| authorships[0].institutions[0].ror | https://ror.org/035zn2q74 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I200749728 |
| authorships[0].institutions[0].country_code | PK |
| authorships[0].institutions[0].display_name | Pir Mehr Ali Shah Arid Agriculture University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Syeda Mariam Muzammal |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | University Institute of Information Technology, PMAS Arid Agriculture University, Rawalpindi 46000, Pakistan |
| authorships[1].author.id | https://openalex.org/A5062919173 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-9500-1361 |
| authorships[1].author.display_name | Raja Kumar Murugesan |
| authorships[1].countries | MY |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I4210143550 |
| authorships[1].affiliations[0].raw_affiliation_string | School of Computer Science, SCE, Taylor's University Lakeside Campus, Subang Jaya 47500, Malaysia |
| authorships[1].institutions[0].id | https://openalex.org/I4210143550 |
| authorships[1].institutions[0].ror | https://ror.org/0498pcx51 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I4210143550 |
| authorships[1].institutions[0].country_code | MY |
| authorships[1].institutions[0].display_name | Taylor's University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Raja Kumar Murugesan |
| authorships[1].is_corresponding | True |
| authorships[1].raw_affiliation_strings | School of Computer Science, SCE, Taylor's University Lakeside Campus, Subang Jaya 47500, Malaysia |
| authorships[2].author.id | https://openalex.org/A5029582839 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-8116-4733 |
| authorships[2].author.display_name | N. Z. Jhanjhi |
| authorships[2].countries | MY |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I4210143550 |
| authorships[2].affiliations[0].raw_affiliation_string | School of Computer Science, SCE, Taylor's University Lakeside Campus, Subang Jaya 47500, Malaysia |
| authorships[2].institutions[0].id | https://openalex.org/I4210143550 |
| authorships[2].institutions[0].ror | https://ror.org/0498pcx51 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I4210143550 |
| authorships[2].institutions[0].country_code | MY |
| authorships[2].institutions[0].display_name | Taylor's University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Noor Zaman Jhanjhi |
| authorships[2].is_corresponding | True |
| authorships[2].raw_affiliation_strings | School of Computer Science, SCE, Taylor's University Lakeside Campus, Subang Jaya 47500, Malaysia |
| authorships[3].author.id | https://openalex.org/A5027472030 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-6339-2257 |
| authorships[3].author.display_name | Mamoona Humayun |
| authorships[3].countries | SA |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I199702508 |
| authorships[3].affiliations[0].raw_affiliation_string | Department of Information Systems, College of Computer and Information Sciences, Jouf University, Sakaka 72388, Saudi Arabia |
| authorships[3].institutions[0].id | https://openalex.org/I199702508 |
| authorships[3].institutions[0].ror | https://ror.org/02zsyt821 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I199702508 |
| authorships[3].institutions[0].country_code | SA |
| authorships[3].institutions[0].display_name | Jouf University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Mamoona Humayun |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Department of Information Systems, College of Computer and Information Sciences, Jouf University, Sakaka 72388, Saudi Arabia |
| authorships[4].author.id | https://openalex.org/A5059481733 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-5526-3623 |
| authorships[4].author.display_name | Ashraf Osman Ibrahim |
| authorships[4].countries | MY |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I161371597 |
| authorships[4].affiliations[0].raw_affiliation_string | Faculty of Computing and Informatics, University Malaysia Sabah, Kota Kinabalu 88400, Malaysia |
| authorships[4].institutions[0].id | https://openalex.org/I161371597 |
| authorships[4].institutions[0].ror | https://ror.org/040v70252 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I161371597 |
| authorships[4].institutions[0].country_code | MY |
| authorships[4].institutions[0].display_name | Universiti of Malaysia Sabah |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Ashraf Osman Ibrahim |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Faculty of Computing and Informatics, University Malaysia Sabah, Kota Kinabalu 88400, Malaysia |
| authorships[5].author.id | https://openalex.org/A5089757453 |
| authorships[5].author.orcid | |
| authorships[5].author.display_name | Abdelzahir Abdelmaboud |
| authorships[5].countries | SA |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I82952536 |
| authorships[5].affiliations[0].raw_affiliation_string | Department of Information Systems, King Khalid University, Muhayel Aseer 61913, Saudi Arabia |
| authorships[5].institutions[0].id | https://openalex.org/I82952536 |
| authorships[5].institutions[0].ror | https://ror.org/052kwzs30 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I82952536 |
| authorships[5].institutions[0].country_code | SA |
| authorships[5].institutions[0].display_name | King Khalid University |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Abdelzahir Abdelmaboud |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Department of Information Systems, King Khalid University, Muhayel Aseer 61913, Saudi Arabia |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.mdpi.com/1424-8220/22/18/7052/pdf?version=1663562167 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9997000098228455 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2554282488, https://openalex.org/W4311097251, https://openalex.org/W4245926026, https://openalex.org/W2586548817, https://openalex.org/W2625093826, https://openalex.org/W2950174689, https://openalex.org/W4200598720, https://openalex.org/W2921026492, https://openalex.org/W4361251261, https://openalex.org/W1971339394 |
| cited_by_count | 52 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 19 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 17 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 13 |
| counts_by_year[3].year | 2022 |
| counts_by_year[3].cited_by_count | 3 |
| locations_count | 5 |
| best_oa_location.id | doi:10.3390/s22187052 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S101949793 |
| best_oa_location.source.issn | 1424-8220 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1424-8220 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Sensors |
| best_oa_location.source.host_organization | https://openalex.org/P4310310987 |
| best_oa_location.source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310310987 |
| best_oa_location.source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://www.mdpi.com/1424-8220/22/18/7052/pdf?version=1663562167 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Sensors |
| best_oa_location.landing_page_url | https://doi.org/10.3390/s22187052 |
| primary_location.id | doi:10.3390/s22187052 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S101949793 |
| primary_location.source.issn | 1424-8220 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1424-8220 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Sensors |
| primary_location.source.host_organization | https://openalex.org/P4310310987 |
| primary_location.source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310310987 |
| primary_location.source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://www.mdpi.com/1424-8220/22/18/7052/pdf?version=1663562167 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Sensors |
| primary_location.landing_page_url | https://doi.org/10.3390/s22187052 |
| publication_date | 2022-09-17 |
| publication_year | 2022 |
| referenced_works | https://openalex.org/W3013375325, https://openalex.org/W2801119850, https://openalex.org/W2548355741, https://openalex.org/W3006210341, https://openalex.org/W4205946811, https://openalex.org/W4206017326, https://openalex.org/W2803967002, https://openalex.org/W3110310174, https://openalex.org/W2940445088, https://openalex.org/W3121084507, https://openalex.org/W2790799828, https://openalex.org/W6774227634, https://openalex.org/W2902437262, https://openalex.org/W2804907169, https://openalex.org/W2965257972, https://openalex.org/W3123550084, https://openalex.org/W3133564241, https://openalex.org/W3104716294, https://openalex.org/W2571922848, https://openalex.org/W2904959125, https://openalex.org/W3092415487, https://openalex.org/W2748266636, https://openalex.org/W2604890914, https://openalex.org/W2801118360, https://openalex.org/W6751210812, https://openalex.org/W3194930326, https://openalex.org/W3131952991, https://openalex.org/W3174012745, https://openalex.org/W3137188511, https://openalex.org/W6788619723, https://openalex.org/W4206357383, https://openalex.org/W4206434532, https://openalex.org/W3184472875, https://openalex.org/W4205498250, https://openalex.org/W3205196064, https://openalex.org/W2612967926, https://openalex.org/W2918682973, https://openalex.org/W2973212718, https://openalex.org/W2920030036, https://openalex.org/W2803073232, https://openalex.org/W2901860452, https://openalex.org/W2767471378, https://openalex.org/W2356450312, https://openalex.org/W2920115059, https://openalex.org/W2975754425, https://openalex.org/W2080226897, https://openalex.org/W2027307583, https://openalex.org/W2370696599, https://openalex.org/W2269222209, https://openalex.org/W3120299767, https://openalex.org/W3006718744, https://openalex.org/W2802305814 |
| referenced_works_count | 52 |
| abstract_inverted_index.In | 0 |
| abstract_inverted_index.To | 40 |
| abstract_inverted_index.as | 56, 123, 125 |
| abstract_inverted_index.de | 4 |
| abstract_inverted_index.in | 22, 31, 44, 53, 118, 128, 173, 181, 190, 196 |
| abstract_inverted_index.is | 15, 73, 178, 185 |
| abstract_inverted_index.of | 34, 83, 92, 106, 151, 175 |
| abstract_inverted_index.on | 139 |
| abstract_inverted_index.to | 17, 76, 102 |
| abstract_inverted_index.35% | 188 |
| abstract_inverted_index.IoT | 1, 24, 35, 72 |
| abstract_inverted_index.Low | 9 |
| abstract_inverted_index.RPL | 119 |
| abstract_inverted_index.The | 130, 149, 171 |
| abstract_inverted_index.and | 11, 37, 63, 80, 95, 115, 134, 144, 187 |
| abstract_inverted_index.are | 25, 96 |
| abstract_inverted_index.due | 75 |
| abstract_inverted_index.for | 8, 71, 99, 168 |
| abstract_inverted_index.its | 77 |
| abstract_inverted_index.not | 97 |
| abstract_inverted_index.the | 3, 29, 32, 104, 113, 121, 152, 164 |
| abstract_inverted_index.2.3% | 194 |
| abstract_inverted_index.45%, | 186 |
| abstract_inverted_index.46%, | 179 |
| abstract_inverted_index.IoT, | 46 |
| abstract_inverted_index.IoT. | 129 |
| abstract_inverted_index.RPL. | 170 |
| abstract_inverted_index.Rank | 114 |
| abstract_inverted_index.This | 109 |
| abstract_inverted_index.been | 51 |
| abstract_inverted_index.have | 50, 89 |
| abstract_inverted_index.loss | 183 |
| abstract_inverted_index.only | 193 |
| abstract_inverted_index.rate | 184 |
| abstract_inverted_index.show | 67 |
| abstract_inverted_index.such | 55 |
| abstract_inverted_index.than | 163 |
| abstract_inverted_index.that | 68, 159 |
| abstract_inverted_index.well | 124 |
| abstract_inverted_index.with | 28, 192 |
| abstract_inverted_index.work | 111 |
| abstract_inverted_index.(RPL) | 14 |
| abstract_inverted_index.Lossy | 12 |
| abstract_inverted_index.Power | 10 |
| abstract_inverted_index.facto | 5 |
| abstract_inverted_index.model | 136, 154 |
| abstract_inverted_index.nodes | 127 |
| abstract_inverted_index.power | 198 |
| abstract_inverted_index.shows | 158 |
| abstract_inverted_index.smart | 84, 107 |
| abstract_inverted_index.terms | 174 |
| abstract_inverted_index.trust | 142 |
| abstract_inverted_index.better | 162 |
| abstract_inverted_index.chosen | 141 |
| abstract_inverted_index.mobile | 126 |
| abstract_inverted_index.nature | 82 |
| abstract_inverted_index.number | 33 |
| abstract_inverted_index.packet | 182 |
| abstract_inverted_index.relies | 138 |
| abstract_inverted_index.simple | 78 |
| abstract_inverted_index.static | 122 |
| abstract_inverted_index.Routing | 6, 20 |
| abstract_inverted_index.SMTrust | 160 |
| abstract_inverted_index.Studies | 66 |
| abstract_inverted_index.address | 41 |
| abstract_inverted_index.attacks | 21, 43, 117 |
| abstract_inverted_index.average | 197 |
| abstract_inverted_index.devices | 38 |
| abstract_inverted_index.dynamic | 100 |
| abstract_inverted_index.factors | 143 |
| abstract_inverted_index.machine | 57 |
| abstract_inverted_index.methods | 167 |
| abstract_inverted_index.routing | 42 |
| abstract_inverted_index.satisfy | 103 |
| abstract_inverted_index.several | 47 |
| abstract_inverted_index.through | 155 |
| abstract_inverted_index.various | 18 |
| abstract_inverted_index.Existing | 86 |
| abstract_inverted_index.Networks | 13 |
| abstract_inverted_index.Protocol | 7 |
| abstract_inverted_index.attacks. | 19 |
| abstract_inverted_index.becoming | 26 |
| abstract_inverted_index.critical | 27 |
| abstract_inverted_index.devices. | 85 |
| abstract_inverted_index.existing | 165 |
| abstract_inverted_index.feasible | 74 |
| abstract_inverted_index.increase | 30, 189, 195 |
| abstract_inverted_index.learning | 58 |
| abstract_inverted_index.metrics, | 145 |
| abstract_inverted_index.metrics. | 148 |
| abstract_inverted_index.mobility | 94 |
| abstract_inverted_index.nodes’ | 93 |
| abstract_inverted_index.performs | 161 |
| abstract_inverted_index.proposed | 52, 131, 153 |
| abstract_inverted_index.research | 110 |
| abstract_inverted_index.securing | 169 |
| abstract_inverted_index.security | 48, 70 |
| abstract_inverted_index.systems, | 62 |
| abstract_inverted_index.topology | 176 |
| abstract_inverted_index.(SMTrust) | 137 |
| abstract_inverted_index.Blackhole | 116 |
| abstract_inverted_index.Mobility, | 133 |
| abstract_inverted_index.RPL-based | 23, 45 |
| abstract_inverted_index.Security, | 132 |
| abstract_inverted_index.addresses | 112 |
| abstract_inverted_index.carefully | 140 |
| abstract_inverted_index.detection | 61 |
| abstract_inverted_index.evaluated | 98 |
| abstract_inverted_index.globally. | 39 |
| abstract_inverted_index.including | 146 |
| abstract_inverted_index.intrusion | 60 |
| abstract_inverted_index.networks, | 2 |
| abstract_inverted_index.reduction | 180 |
| abstract_inverted_index.scenarios | 101 |
| abstract_inverted_index.solutions | 49, 88 |
| abstract_inverted_index.stability | 177 |
| abstract_inverted_index.evaluation | 150 |
| abstract_inverted_index.simulation | 156 |
| abstract_inverted_index.vulnerable | 16 |
| abstract_inverted_index.Trust-based | 135 |
| abstract_inverted_index.approaches. | 65 |
| abstract_inverted_index.considering | 120 |
| abstract_inverted_index.experiments | 157 |
| abstract_inverted_index.integration | 79 |
| abstract_inverted_index.literature, | 54 |
| abstract_inverted_index.techniques, | 59 |
| abstract_inverted_index.throughput, | 191 |
| abstract_inverted_index.trust-based | 64, 69, 87, 166 |
| abstract_inverted_index.applications | 36 |
| abstract_inverted_index.consumption. | 199 |
| abstract_inverted_index.insufficient | 90 |
| abstract_inverted_index.requirements | 105 |
| abstract_inverted_index.applications. | 108 |
| abstract_inverted_index.consideration | 91 |
| abstract_inverted_index.improvisation | 172 |
| abstract_inverted_index.mobility-based | 147 |
| abstract_inverted_index.resource-constrained | 81 |
| cited_by_percentile_year.max | 100 |
| cited_by_percentile_year.min | 96 |
| corresponding_author_ids | https://openalex.org/A5062919173, https://openalex.org/A5029582839 |
| countries_distinct_count | 3 |
| institutions_distinct_count | 6 |
| corresponding_institution_ids | https://openalex.org/I4210143550 |
| citation_normalized_percentile.value | 0.97888003 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |