1.
Burrell, D. N. (2021). Creating Diverse and Religiously Inclusive Workplace Cultures in Hyper-Connected, Technical, and cyber-Driven Organizations. International Journal of Sociotechnology and Knowledge Development, 13(3), 17–32. doi:10.4018/ IJSKD.2021070102
2.
K.Prathapchandran and T.Janani , “A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest – RFTRUST“ . Computer Networks. 198(10813), 1-20, 2021
3.
Farooq, M. J., & Zhu, Q. “Secure and Reconfigurable Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)”. 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt). doi:10.23919/wiopt.2017.7959892, 2017.
4.
Ferrara, P., Mandal, A. K., Cortesi, A., & Spoto, F. (2021). Static analysis for discovering IoT vulnerabilities. International Journal of Software Tools for Technology Transfer, 23(1), 71–88. doi:10.1007/s10009-020-00592-x
5.
Nobre, J., Rosario, D., Both, C., Cerqueira, E., & Gerla, M, “Toward Software-Defined Battlefield Networking”. IEEE Communications Magazine, 54(10), 152–157. doi:10.1109/mcom.2016.7588285, 2016.
6.
K.Prathapchandran and T.Janani, “Decision Tree Trust (DTTrust)-Based Authentication Mechanism to Secure RPL Routing Protocol in Internet of Battlefield Thing (IoBT)”, International Journal of Business Data Communications and Networking (IJBDCN), 1(17), pp.1-23, 2021.
7.
Pongle, P., & Chavan, G, “A Survey: Attacks on RPL and 6LoWPAN in IoT”. International Conference on Pervasive Computing (ICPC). doi:10.1109/pervasive.2015.7087034, 2015.
8.
Kamble, A., Malemath, V. S., & Patil, D, “Security Attacks and Secure Routing Protocols in RPL-Based Internet of Things: Survey”, International Conference on Emerging Trends & Innovation in ICT (ICEI). doi:10.1109/etiict.2017.7977006, 2017.
9.
Winter, T., “RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks”, https://tools.ietf.org/html/rfc6550, 2012.
10.
Glissa G, Rachedi, A, & Meddeb, A, “A Secure Routing Protocol-Based on RPL for Internet of Things” . 2016 IEEE Global Communications Conference (GLOBECOM). doi:10.1109/glocom.2016.7841543,2016.
11.
Li, S., Iqbal, M., & Saxena, N. (2022). Future industry internet of things with zero-trust security. Information Systems Frontiers, 1-14.
12.
Koohang, A., Sargent, C. S., Nord, J. H., & Paliszkiewicz, J. (2022). Internet of Things (IoT): From awareness to continued use. International Journal of Information Management, 62, 102442.
13.
Marill, K. A, “Advanced Statistics: Linear Regression, Part II: Multiple Linear Regression. Academic Emergency Medicine” , 11(1), 94–102. doi: 10.1197/j.aem.2003.09.006, 2004.
14.
Ng, H. P., Ong, S. H., Foong, K. W. C., Goh, P. S., & Nowinski, W. L. (n.d.). “Medical Image Segmentation Using K-Means Clustering and Improved Watershed Algorithm”, IEEE Southwest Symposium on Image Analysis and Interpretation. doi:10.1109/ssiai.2006.1633722, 2006.
15.
Shanmugam, S., V., M. G., K., P., & T., J. (2022). Mitigating Black Hole Attacks in Routing Protocols Using a Machine Learning-Based Trust Model. International Journal of Socio technology and Knowledge Development (IJSKD), 14(1), 1-23. http://doi.org/10.4018/IJSKD.310067
16.
Nidheesh, N., Abdul Nazeer, K. A., & Ameer, P. M. “ An Enhanced Deterministic K-Means Clustering Algorithm for Cancer Subtype Prediction from Gene Expression Data” . Computers in Biology and Medicine, 91, 213–221. doi: 10.1016/j.compbiomed.2017.10.014, 2017.
17.
Cui, H., Ruan, G., Xue, J., Xie, R., Wang, L., & Feng, X, “ A Collaborative Divide-and-Conquer K-means Clustering Algorithm for Processing Large Data”, Proceedings of the 11th ACM Conference on Computing Frontiers - CF ‘14. doi:10.1145/2597917.2597918, 2014.
18.
Kavitha, A., Reddy, V. B., Singh, N., Gunjan, V. K., Lakshmanna, K., Khan, A. A., & Wechtaisong, C. (2022). Security in IoT Mesh Networks based on Trust Similarity. IEEE Access, 10, 121712-121724.
19.
S. Raza, L. Seitz, D. Sitenkov, G. Selander, “S3K: Scalable Security with Symmetric Keys ? DTLS Key Establishment for the Internet of Things” , IEEE Trans. Autom. Sci. Eng. 13 (2016) 1270–1280, http://dx.doi.org/10.1109/TASE.2015.2511301, 2016.
20.
Rutravigneshwaran, P., Anitha, G. & Prathapchandran, K. “Trust-based support vector regressive (TSVR) security mechanism to identify malicious nodes in the Internet of Battlefield Things (IoBT)”. Int J Syst Assur Eng Manag. https://doi.org/10.1007/s13198-022-01719-w, 2022
21.
Hassan, T., Asim, M., Baker, T., Hassan, J., & Tariq, N. (2021). CTrust?RPL: A control layer?based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks?based Internet of Things applications. Transactions on Emerging Telecommunications Technologies, 32(3), e4224.
22.
Sahay, G. Geethakumari, B. Mitra and V. Thejas, “Exponential Smoothing-Based Approach for Detection of Blackhole Attacks in IoT,” IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Indore, India, 2018, pp. 1-6, doi: 10.1109/ANTS.2018.8710073,2018.
23.
Alamr, A. A., Kausar, F., Kim, J., & Seo, C, “A Secure ECC-Based RFID Mutual Authentication Protocol for Internet of Things”. The Journal of Supercomputing, 74(9), 4281–4294, 2018.
24.
Patel, H. B., & Jinwala, D. C, “ Blackhole Detection in 6LoWPAN-Based Internet of Things: An Anomaly Based Approach”. TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON). doi:10.1109/tencon.2019.8929491,2019.
25.
Bostani, H., & Sheikhan, M, “ Hybrid of Anomaly-Based and Specification Based IDS for Internet of Things Using Unsupervised OPF Based on MapReduce Approach”. Computer Communications, 98, 52–71. doi:10.1016/j.comcom.2016.12.001, 2017.
26.
Seyedi, B., & Fotohi, R, “NIASHPT: A Novel Intelligent Agent-Based Strategy Using Hello Packet Table (HPT) Function for Trust Internet of Things”. The Journal of Supercomputing. doi:10.1007/s11227-019-03143-7,2020.
27.
Yahyaoui, A., Abdellatif, T., & Attia, R, “Hierarchical Anomaly-Based Intrusion Detection and Localization in IoT” 15th International Wireless Communications & Mobile Computing Conference (IWCMC). doi:10.1109/iwcmc.2019.8766574, 2019.
28.
Ullah, I., & Mahmoud, Q. H, “A Two-Level Flow-Based Anomalous Activity Detection System for IoT Networks”. Electronics, 9(3), 530. doi:10.3390/electronics9030530, 2020.
29.
Qureshi, K. N., Rana, S. S., Ahmed, A., & Jeon, G, “A Novel and Secure Attacks Detection Framework for Smart Cities Industrial Internet of Things”. Sustainable Cities and Society, 102343. doi: 10.1016/j.scs.2020.102343,2020.
30.
Airehrour D, Gutierrez JA, Ray SK , “SecTrust-RPL: a secure trust-aware RPL Routing protocol for Internet of Things” . Future Generation Computer System. https://doi.org/10.1016/j.future.2018.03.021., 2018
31.
Kandhoul, N., Dhurandher, S. K., & Woungang, I. T_CAFE: “A Trust based Security approach for Opportunistic IoT”., IET Communications. doi:10.1049/iet-com.2019.0657.2019.
32.
Airehrour D, Gutierrez JA, Ray SK , “A trust-aware RPL routing protocol to detect black hole and selective forwarding attacks” . J Telecommun Digital Econ 5(1):50–69. https://doi.org/10.18080/ jtde.v5n1.88,2017.
33.
Mehta, R., & Parmar, M. M, “ Trust-Based Mechanism for Securing IoT Routing Protocol RPL Against Wormhole & Grayhole Attacks” . 2018 3rd International Conference for Convergence in Technology (I2CT). doi:10.1109/i2ct.2018.8529426, 2018.
34.
Lim, J., Ko, Y.-B., Kim, D., & Kim, D, “ A Stepwise Approach for Energy Efficient Trust Evaluation in Military IoT Networks”. International Conference on Information and Communication Technology Convergence (ICTC). doi:10.1109/ictc.2018.8539353, 2018.
35.
Kamble, A., Malemath, V. S., & Patil, D. “Security Attacks and Secure Routing Protocols in RPL-Based Internet of Things: Survey”, International Conference on Emerging Trends & Innovation in ICT (ICEI). doi:10.1109/etiict.2017.7977006, 2017.
36.
Kaur, J., Singh, G., “A Blockchain-Based Machine Learning Intrusion Detection System for Internet of Things” . In: Daimi, K., Dionysiou, I., El Madhoun, N. (eds) Principles and Practice of Blockchains. Springer, Cham. https://doi.org/10.1007/978-3-031-10507-4_650,2023.
37.
Sun, Xi., Chang, G., & Li, F, “A Trust Management Model to Enhance Security of Cloud Computing Environments” , Second International Conference on Networking and Distributed Computing. doi:10.1109/icndc.2011.56. 2011.
38.
Alshehri, M. D., Hussain, F., Elkhodr, M., & Alsinglawi, B. S, “A Distributed Trust Management Model for the Internet of Things (DTM-IoT)” . EAI/Springer Innovations in Communication and Computing, 1–9. doi:10.1007/978-3-319-99966-1_1, 2019.
39.
Abdalla Ahmed, A. I., Ab Hamid, S. H., Gani, A., Suleman khan, & Khan, M. K, “ Trust and Reputation for Internet of Things: Fundamentals, Taxonomy, and Open Research Challenges”. Journal of Network and Computer Applications, 102409. doi:10.1016/j.jnca.2019.102409, 2019.
40.
J. H. Cho, A. Swami, and I. R. Chen, “A Survey on Trust Management for Mobile Ad Hoc Networks,” IEEE Communications Surveys & Tutorials, vol. 13, no. 4, pp. 562-583. 2011.
41.
Guo, J., Chen, I.-R., & Tsai, J. J. P.,“ A Survey of Trust Computation Models for Service Management in Internet of Things Systems”. Computer Communications, 97, 1–14. doi:10.1016/j.comcom.2016.10.012, 2017.
42.
Liqin, T., Chuang, L., & Tieguo, J. “ Quantitative Analysis of Trust Evidence in Internet” , International Conference on Communication Technology. doi:10.1109/icct.2006.342023, 2006.
43.
Tripathy, B. K., Jena, S. K., Bera, P., & Das, “ An Adaptive Secure and Efficient Routing Protocol for Mobile Ad Hoc Networks”. Wireless Personal Communications. doi:10.1007/s11277-020-07423-x ,2020.
44.
Wang, B., Chen, X., & Chang, W. “A Light-Weight Trust-Based QoS Routing Algorithm for Ad Hoc Networks” . Pervasive and Mobile Computing, 13, 164–180. doi:10.1016/j.pmcj.2013.06.004, 2014.
45.
Wang, Y., Tian, Y., Miao, R., & Chen, W, “Heterogeneous IoTs Routing Strategy Based on Cellular Address” . IEEE International Conference on Smart Internet of Things (SmartIoT). doi:10.1109/smartiot.2018.00021,2018.
46.
Shabut, A. M., Kaiser, M. S., Dahal, K. P., & Chen, W, “ A Multidimensional Trust Evaluation Model for MANETs”, Journal of Network and Computer Applications. doi:10.1016/j.jnca.2018.07.008, 2018.
47.
Liang, W., Long, J., Weng, T.-H., Chen, X., Li, K.-C., & Zomaya, A. Y. “ TBRS: A trust based recommendation scheme for vehicular CPS network”. Future Generation Computer Systems. doi:10.1016/j.future.2018.09.002, 2018.
48.
Iltaf, N., Ghafoor, A., & Zia, U. “ A Mechanism for Detecting Dishonest Recommendation in Indirect Trust Computation” . EURASIP Journal on Wireless Communications and Networking, 2013(1). doi:10.1186/1687-1499-2013-189,2013.
49.
Airehrour, D., Gutierrez, J., & Ray, S. K, “ Securing RPL Routing Protocol from Blackhole Attacks Using a Trust-Based Mechanism” , 26th International Telecommunication Networks and Applications Conference (ITNAC). doi:10.1109/atnac.2016.7878793, 2016.