1.
Y. Xu, J. Liu, Y. Shen, J. Liu, X. Jiang, and T. Taleb, “Incentive Jamming-Based Secure Routing in Decentralized Internet of Things,” IEEE Internet Things J., vol. 8, no. 4, pp. 3000–3013, 2021
2.
T. Ul Hassan, M. Asim, T. Baker, J. Hassan, and N. Tariq, “CTrust?RPL?: A control layer?based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks?based Internet of Things applications,” Trans Emerging Tel Tech, vol. 32, no. 3, 2021.
3.
P. Sathyaraj and D. Rukmani Devi, “Designing the routing protocol with secured IoT devices and QoS over Manet using trust-based performance evaluation method,” J Ambient Intell Human Comput, vol. 12, no. 7, pp. 6987–6995, Jul. 2021.
4.
R. Sahay, G. Geethakumari, and B. Mitra, “A novel blockchain based framework to secure IoT-LLNs against routing attacks,” Computing, vol. 102, no. 11, pp. 2445–2470, 2020.
5.
R. Nagaraju et al., “Secure Routing-Based Energy Optimization for IoT Application with Heterogeneous Wireless Sensor Networks,” Energies, vol. 15, no. 13, p. 4777, 2022.
6.
S. Sharma and V. K. Verma, “Security explorations for routing attacks in low power networks on internet of things,” J Supercomput, vol. 77, no. 5, pp. 4778–4812, 2021.
7.
S. Md. Mujeeb, R. Praveen Sam, and K. Madhavi, “Adaptive EHTARA: An Energy-Efficient and Trust Aware Secure Routing Algorithm for Big Data Classification in IoT Network,” Wireless Pers Commun, vol. 121, no. 1, pp. 621–646, 2021.
8.
N. Djedjig, D. Tandjaoui, F. Medjek, and I. Romdhani, “Trust-aware and cooperative routing protocol for IoT security,” Journal of Information Security and Applications, vol. 52, p. 102467, 2020.
9.
Y. Shibasaki, K. Iwamura, and K. Sato, “A Communication-Efficient Secure Routing Protocol for IoT Networks,” Sensors, vol. 22, no. 19, p. 7503, 2022.
10.
A. Pliatsios, K. Kotis, and C. Goumopoulos, “A systematic review on semantic interoperability in the IoE-enabled smart cities,” Internet of Things, vol. 22, p. 100754, 2023.
11.
Z. A. Almusaylim, N. Jhanjhi, and A. Alhumam, “Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP,” Sensors, vol. 20, no. 21, p. 5997, 2020.
12.
A. Sharma and N. Kumar, “Third Eye: An Intelligent and Secure Route Planning Scheme for Critical Services Provisions in Internet of Vehicles Environment,” IEEE Systems Journal, vol. 16, no. 1, pp. 1217–1227, 2022.
13.
E. O’Connell, W. O’Brien, M. Bhattacharya, D. Moore, and M. Penica, “Digital Twins: Enabling Interoperability in Smart Manufacturing Networks,” Telecom, vol. 4, no. 2, pp. 265–278, May 2023.
14.
G. Pradeep Reddy and Y. V. Pavan Kumar, “Internet of Things Based Communication Architecture for Switchport Security and Energy Management in Interoperable Smart Microgrids,” Arab J Sci Eng, vol. 48, no. 5, pp. 5809–5827, May 2023.
15.
I. Roussaki et al., “Building an interoperable space for smart agriculture,” Digital Communications and Networks, vol. 9, no. 1, pp. 183–193, Feb. 2023.
16.
M. Hosseinzadeh et al., “A Cluster-Tree-Based Secure Routing Protocol Using Dragonfly Algorithm (DA) in the Internet of Things (IoT) for Smart Agriculture,” Mathematics, vol. 11, no. 1, p. 80, 2022.
17.
S. M. Muzammal, R. K. Murugesan, N. Z. Jhanjhi, M. Humayun, A. O. Ibrahim, and A. Abdelmaboud, “A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things,” Sensors, vol. 22, no. 18, p. 7052, 2022.
18.
A. Agiollo, M. Conti, P. Kaliyar, T.-N. Lin, and L. Pajola, “DETONAR: Detection of Routing Attacks in RPL-Based IoT,” IEEE Trans. Netw. Serv. Manage., vol. 18, no. 2, pp. 1178–1190, 2021.
19.
A. O. Khadidos, S. Shitharth, A. O. Khadidos, K. Sangeetha, and K. H. Alyoubi, “Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism,” Journal of Sensors, vol. 2022, pp. 1–17, 2022.
20.
M. A. Abbasi, Z. A. Memon, N. M. Durrani, W. Haider, K. Laeeq, and G. A. Mallah, “A multi-layer trust-based middleware framework for handling interoperability issues in heterogeneous IOTs,” Cluster Comput, vol. 24, no. 3, pp. 2133–2160, 2021.
21.
A. Gupta and A. Singh, “An Intelligent Healthcare Cyber Physical Framework for Encephalitis Diagnosis Based on Information Fusion and Soft-Computing Techniques,” New Gener. Comput., vol. 40, no. 4, pp. 1093–1123, Dec. 2022.
22.
S. M. Muzammal, R. K. Murugesan, N. Jhanjhi, M. S. Hossain, and A. Yassine, “Trust and Mobility-Based Protocol for Secure Routing in Internet of Things,” Sensors, vol. 22, no. 16, p. 6215, 2022.
23.
F. Medjek, D. Tandjaoui, N. Djedjig, and I. Romdhani, “Multicast DIS attack mitigation in RPL-based IoT-LLNs,” Journal of Information Security and Applications, vol. 61, p. 102939, Sep. 2021.
24.
M. Zaminkar and R. Fotohi, “SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism,” Wireless Pers Commun, vol. 114, no. 2, pp. 1287–1312, Sep. 2020.
25.
P.S. Nandhini, S. Kuppuswami, S. Malliga, and R. DeviPriya, “nhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers,” The Journal of Supercomputing, vol. 79, no. 6, pp.6825-6848, 2023.