{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T14:40:34Z","timestamp":1770388834473,"version":"3.49.0"},"reference-count":75,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1016\/j.comnet.2025.111968","type":"journal-article","created":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T00:07:50Z","timestamp":1766794070000},"page":"111968","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["An efficient and reliable mechanism for Wormhole detection in RPL based IoT networks"],"prefix":"10.1016","volume":"276","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-5741-0180","authenticated-orcid":false,"given":"Jawad","family":"Hassan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2178-486X","authenticated-orcid":false,"given":"Muhammad Yousaf Ali","family":"Raza","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0089-4089","authenticated-orcid":false,"given":"Adnan","family":"Sohail","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2894-7891","authenticated-orcid":false,"given":"Muhammad","family":"Asim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3618-779X","authenticated-orcid":false,"given":"Zeeshan","family":"Pervez","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2025.111968_bib0001","first-page":"1","article-title":"A review and state of art of internet of things (IoT)","author":"Laghari","year":"2021","journal-title":"Arch. Comput. Methods Eng."},{"issue":"4","key":"10.1016\/j.comnet.2025.111968_bib0002","doi-asserted-by":"crossref","DOI":"10.3390\/app13042156","article-title":"Design of a smart factory based on cyber-Physical systems and internet of things towards industry 4.0","volume":"13","author":"Ryalat","year":"2023","journal-title":"Applied Sciences"},{"issue":"4","key":"10.1016\/j.comnet.2025.111968_bib0003","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1109\/COMST.2022.3201557","article-title":"A survey on IoT-enabled home automation systems: attacks and defenses","volume":"24","author":"Wang","year":"2022","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"13","key":"10.1016\/j.comnet.2025.111968_bib0004","doi-asserted-by":"crossref","first-page":"10474","DOI":"10.1109\/JIOT.2021.3062630","article-title":"Internet of things (IoT): a review of its enabling technologies in healthcare applications, standards protocols, security, and market opportunities","volume":"8","author":"Bhuiyan","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"10.1016\/j.comnet.2025.111968_bib0005","doi-asserted-by":"crossref","first-page":"1175","DOI":"10.1109\/COMST.2022.3158270","article-title":"A survey of intelligent network slicing management for industrial IoT: integrated approaches for smart transportation, smart energy, and smart factory","volume":"24","author":"Wu","year":"2022","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"9","key":"10.1016\/j.comnet.2025.111968_bib0006","doi-asserted-by":"crossref","first-page":"15792","DOI":"10.1109\/JIOT.2024.3349394","article-title":"Enabling lightweight device authentication in message queuing telemetry transport protocol","volume":"11","author":"S","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"10.1016\/j.comnet.2025.111968_bib0007","doi-asserted-by":"crossref","DOI":"10.3390\/s23083880","article-title":"Smart transportation: an overview of technologies and applications","volume":"23","author":"Oladimeji","year":"2023","journal-title":"Sensors"},{"key":"10.1016\/j.comnet.2025.111968_bib0008","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.future.2021.08.006","article-title":"Recent advancements and challenges of internet of things in smart agriculture: a survey","volume":"126","author":"Sinha","year":"2022","journal-title":"Future Generat. Comput. Syst."},{"key":"10.1016\/j.comnet.2025.111968_bib0009","unstructured":"S. Sinha, Number of connected IoT devices growing 14% to 21.1 billion globally, 2025, (https:\/\/iot-analytics.com\/number-connected-iot-devices\/). Accessed: 2025-11-19."},{"key":"10.1016\/j.comnet.2025.111968_bib0010","doi-asserted-by":"crossref","first-page":"31136","DOI":"10.1109\/ACCESS.2024.3368633","article-title":"Detecting version number attacks in low power and lossy networks for internet of things routing: review and taxonomy","volume":"12","author":"Alfriehat","year":"2024","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.comnet.2025.111968_bib0011","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/network4010001","article-title":"A survey on routing solutions for low-Power and lossy networks: toward a reliable path-Finding approach","volume":"4","author":"Almutairi","year":"2024","journal-title":"Network"},{"issue":"1","key":"10.1016\/j.comnet.2025.111968_bib0012","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JIOT.2021.3095077","article-title":"A survey on federated learning for resource-constrained IoT devices","volume":"9","author":"Imteaj","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"10.1016\/j.comnet.2025.111968_bib0013","doi-asserted-by":"crossref","first-page":"3640","DOI":"10.1109\/JSEN.2024.3506816","article-title":"IP-RPL: An intelligent power-Aware routing protocol for next-Generation low-Power networks","volume":"25","author":"Vidhya","year":"2025","journal-title":"IEEE Sens. J."},{"key":"10.1016\/j.comnet.2025.111968_bib0014","doi-asserted-by":"crossref","unstructured":"A.S.J. Charles, K. Palanisamy, M. Venugopal, S. Shanmugam, RPL Enhancement with E-Sigma routing method, J. Ambient Intell. Humaniz. Comput. 14 (6) 7813\u20137826.","DOI":"10.1007\/s12652-023-04593-x"},{"key":"10.1016\/j.comnet.2025.111968_bib0015","series-title":"Request for Comments","article-title":"RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks","author":"Alexander","year":"2012"},{"key":"10.1016\/j.comnet.2025.111968_bib0016","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.jpdc.2019.08.013","article-title":"A mobile code-driven trust mechanism for detecting internal attacks in sensor node-powered IoT","volume":"134","author":"Tariq","year":"2019","journal-title":"J. Parallel. Distrib. Comput."},{"key":"10.1016\/j.comnet.2025.111968_bib0017","series-title":"Secure Routing and Forwarding in RPL-based Internet of Things: challenges and solutions","author":"Raoof","year":"2021"},{"issue":"4","key":"10.1016\/j.comnet.2025.111968_bib0018","doi-asserted-by":"crossref","first-page":"7141","DOI":"10.1109\/JIOT.2023.3315757","article-title":"A novel detection and localization scheme for wormhole attack in internet of things","volume":"11","author":"Tong","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"18","key":"10.1016\/j.comnet.2025.111968_bib0019","doi-asserted-by":"crossref","first-page":"6765","DOI":"10.3390\/s22186765","article-title":"Rank and wormhole attack detection model for RPL-based internet of things using machine learning","volume":"22","author":"Zahra","year":"2022","journal-title":"Sensors"},{"issue":"2","key":"10.1016\/j.comnet.2025.111968_bib0020","doi-asserted-by":"crossref","first-page":"1178","DOI":"10.1109\/TNSM.2021.3075496","article-title":"DETONAR: Detection of routing attacks in RPL-Based IoT","volume":"18","author":"Agiollo","year":"2021","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"9","key":"10.1016\/j.comnet.2025.111968_bib0021","doi-asserted-by":"crossref","first-page":"478","DOI":"10.3390\/info14090478","article-title":"A subjective logical framework-based trust model for wormhole attack detection and mitigation in low-Power and lossy (RPL) IoT-Networks","volume":"14","author":"Javed","year":"2023","journal-title":"Information"},{"issue":"3","key":"10.1016\/j.comnet.2025.111968_bib0022","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1007\/s11277-020-07134-3","article-title":"Lightweight cryptography: a solution to secure IoT","volume":"112","author":"Dhanda","year":"2020","journal-title":"Wirel. Person. Commun."},{"key":"10.1016\/j.comnet.2025.111968_bib0023","article-title":"Cryptography algorithms for enhancing IoT security","volume":"22","author":"Thabit","year":"2023","journal-title":"IoT"},{"key":"10.1016\/j.comnet.2025.111968_bib0024","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.future.2020.09.031","article-title":"Real time performance analysis of secure IoT protocols for microgrid communication","volume":"116","author":"Kondoro","year":"2021","journal-title":"Future Generat. Comput. Syst."},{"issue":"11","key":"10.1016\/j.comnet.2025.111968_bib0025","doi-asserted-by":"crossref","first-page":"5666","DOI":"10.1109\/JSEN.2020.2973677","article-title":"Security of RPL based 6LoWPAN networks in the internet of things: a review","volume":"20","author":"Verma","year":"2020","journal-title":"IEEE Sens. J."},{"key":"10.1016\/j.comnet.2025.111968_bib0026","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1016\/j.future.2018.03.021","article-title":"Sectrust-RPL: a secure trust-aware RPL routing protocol for internet of things","volume":"93","author":"Airehrour","year":"2019","journal-title":"Future Generat. Comput. Syst."},{"key":"10.1016\/j.comnet.2025.111968_bib0027","series-title":"Technical Report","article-title":"RPL: IPv6 routing protocol for low-power and lossy networks","author":"Winter","year":"2012"},{"issue":"2","key":"10.1016\/j.comnet.2025.111968_bib0028","article-title":"RPL: IPv6 Routing protocol for low power and lossy networks","volume":"59","author":"Tsvetkov","year":"2011","journal-title":"Sensor Nodes\u2013Operation, Netw. Appl. (SN)"},{"key":"10.1016\/j.comnet.2025.111968_bib0029","doi-asserted-by":"crossref","unstructured":"A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik, J.P. Vasseur, R. Alexander, Rfc 6550: Rpl: Ipv6 routing protocol for low-power and lossy networks, 2012.","DOI":"10.17487\/rfc6550"},{"key":"10.1016\/j.comnet.2025.111968_bib0030","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2022.100467","article-title":"Landscape of IoT security","volume":"44","author":"Schiller","year":"2022","journal-title":"Comput. Sci. Rev."},{"key":"10.1016\/j.comnet.2025.111968_bib0031","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","article-title":"Current research on internet of things (IoT) security: a survey","volume":"148","author":"Hassan","year":"2019","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2025.111968_bib0032","doi-asserted-by":"crossref","unstructured":"A. Heidari, M.A. Jabraeil Jamali, Internet of things intrusion detection systems: a comprehensive review and future directions 26(6) 3753\u20133780.","DOI":"10.1007\/s10586-022-03776-z"},{"key":"10.1016\/j.comnet.2025.111968_bib0033","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","article-title":"A survey on trust management for internet of things","volume":"42","author":"Yan","year":"2014","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.comnet.2025.111968_bib0034","doi-asserted-by":"crossref","first-page":"86840","DOI":"10.1109\/ACCESS.2024.3416095","article-title":"Enhancing sniffing detection in IoT home wi-Fi networks: an ensemble learning approach with network monitoring system (NMS)","volume":"12","author":"Jung Jin","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2025.111968_bib0035","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2025.3525798","article-title":"A simple approach for mitigating a new flooding attack in RPL-Based IoT networks","author":"Rouissat","year":"2025","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.comnet.2025.111968_bib0036","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1177\/09266801241295886","article-title":"Identify spoofing attacks in internet of things (IoT) environments using machine learning algorithms","volume":"31","author":"Vajrobol","year":"2025","journal-title":"J. High Speed Netw."},{"key":"10.1016\/j.comnet.2025.111968_bib0037","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110996","article-title":"Replay attacks in RPL-based internet of things: comparative and empirical study","volume":"257","author":"Albinali","year":"2025","journal-title":"Comput. Netw."},{"issue":"11","key":"10.1016\/j.comnet.2025.111968_bib0038","doi-asserted-by":"crossref","first-page":"6012","DOI":"10.3390\/app15116012","article-title":"A machine-Learning-Based approach for the detection and mitigation of distributed denial-of-Service attacks in internet of things environments","volume":"15","author":"Berr\u00edos","year":"2025","journal-title":"Appl. Sci."},{"key":"10.1016\/j.comnet.2025.111968_bib0039","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2024.100631","article-title":"AI Techniques for IoT-based DDos attack detection: taxonomies, comprehensive review and research challenges","volume":"52","author":"Bala","year":"2024","journal-title":"Comput. Sci. Rev."},{"key":"10.1016\/j.comnet.2025.111968_bib0040","article-title":"A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of internet of things","volume":"22","author":"Al-Amiedy","year":"2023","journal-title":"IoT"},{"issue":"9","key":"10.1016\/j.comnet.2025.111968_bib0041","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/s10462-024-10907-y","article-title":"RPL-Based attack detection approaches in IoT networks: review and taxonomy","volume":"57","author":"Alfriehat","year":"2024","journal-title":"Artif. Intell. Rev."},{"issue":"6","key":"10.1016\/j.comnet.2025.111968_bib0042","doi-asserted-by":"crossref","first-page":"4937","DOI":"10.1109\/JIOT.2020.2971463","article-title":"Sybil attack in RPL-based internet of things: analysis and defenses","volume":"7","author":"Pu","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2025.111968_bib0043","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2024.103576","article-title":"LETM-IoT: a lightweight and efficient trust mechanism for sybil attacks in internet of things networks","volume":"163","author":"Hassan","year":"2024","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.comnet.2025.111968_bib0044","series-title":"2018 5Th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)\/2018 4Th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)","first-page":"12","article-title":"Hatchetman attack: a denial of service attack against routing in low power and lossy networks","author":"Pu","year":"2018"},{"key":"10.1016\/j.comnet.2025.111968_bib0045","series-title":"Proceedings of the 17Th European Workshop on Systems Security","first-page":"29","article-title":"Energy attacks in the battery-less internet of things: directions for the future","author":"Mottola","year":"2024"},{"key":"10.1016\/j.comnet.2025.111968_bib0046","series-title":"2020 IEEE 21St International Conference on High Performance Switching and Routing (HPSR)","first-page":"1","article-title":"A theil index-based countermeasure against advanced vampire attack in internet of things","author":"Pu","year":"2020"},{"key":"10.1016\/j.comnet.2025.111968_bib0047","series-title":"2019 International Conference on Computing, Networking and Communications (ICNC)","first-page":"73","article-title":"Spam DIS attack against routing protocol in the internet of things","author":"Pu","year":"2019"},{"issue":"3","key":"10.1016\/j.comnet.2025.111968_bib0048","article-title":"CTrust-RPL: A control layer-based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks-based internet of things applications","volume":"32","author":"ul Hassan","year":"2021","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"3","key":"10.1016\/j.comnet.2025.111968_bib0049","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00607-025-01440-z","article-title":"Evaluating the impact of selective forwarding attacks on RPL-based 6LoWPAN in IoT: a comprehensive simulation study","volume":"107","author":"Rajasekar","year":"2025","journal-title":"Computing"},{"issue":"1","key":"10.1016\/j.comnet.2025.111968_bib0050","first-page":"41","article-title":"A trust-based defence scheme for mitigating blackhole and selective forwarding attacks in the RPL routing protocol","volume":"6","author":"Airehrour","year":"2018","journal-title":"J. Telecommun. Digit. Econ."},{"key":"10.1016\/j.comnet.2025.111968_bib0051","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2023.103118","article-title":"QSec-RPL: Detection of version number attacks in RPL based mobile IoT using Q-learning","volume":"142","author":"Sharma","year":"2023","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.comnet.2025.111968_bib0052","doi-asserted-by":"crossref","first-page":"43665","DOI":"10.1109\/ACCESS.2020.2977476","article-title":"Mitigation mechanisms against the DAO attack on the routing protocol for low power and lossy networks (RPL)","volume":"8","author":"Wadhaj","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2025.111968_bib0053","doi-asserted-by":"crossref","DOI":"10.1109\/TNSM.2024.3386468","article-title":"Towards RPL attacks and mitigation taxonomy: systematic literature review approach","author":"Albinali","year":"2024","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"10.1016\/j.comnet.2025.111968_bib0054","doi-asserted-by":"crossref","first-page":"111115","DOI":"10.1109\/ACCESS.2022.3215460","article-title":"A lightweight scheme for mitigating RPL version number attacks in IoT networks","volume":"10","author":"Alsukayti","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2025.111968_bib0055","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.comcom.2022.10.014","article-title":"Performance evaluation of mobile RPL-based IoT networks under version number attack","volume":"197","author":"Sharma","year":"2023","journal-title":"Comput. Commun."},{"key":"10.1016\/j.comnet.2025.111968_bib0056","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102914","article-title":"An iot inventory before deployment: a survey on iot protocols, communication technologies, vulnerabilities, attacks, and future research directions","volume":"123","author":"Bang","year":"2022","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2025.111968_bib0057","first-page":"214","article-title":"Performance evaluation of IoT routing protocols","volume":"4","author":"Siddiqui","year":"2022","journal-title":"Int. J. Data Sci. Adv. Anal."},{"issue":"2","key":"10.1016\/j.comnet.2025.111968_bib0058","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1007\/s11277-021-09395-y","article-title":"Wormhole attack detection system for IoT network: a hybrid approach","volume":"124","author":"Bhosale","year":"2022","journal-title":"Wirel. Pers. Commun."},{"issue":"2","key":"10.1016\/j.comnet.2025.111968_bib0059","first-page":"168","article-title":"PCC-RPL: An efficient trust-based security extension for RPL","volume":"31","author":"Pishdar","year":"2022","journal-title":"Inf. Secur. J.: Glob. Perspect."},{"key":"10.1016\/j.comnet.2025.111968_bib0060","series-title":"2020 12Th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)","first-page":"1","article-title":"Performance evaluation of a wormhole detection method using round-trip times and hop counts in RPL-based 6Lowpan networks","author":"Samuel","year":"2020"},{"key":"10.1016\/j.comnet.2025.111968_bib0061","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2020.101849","article-title":"LiDL: localization with early detection of sybil and wormhole attacks in IoT networks","volume":"94","author":"Kaliyar","year":"2020","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2025.111968_bib0062","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1016\/j.promfg.2019.02.292","article-title":"A real-time intrusion detection system for wormhole attack in the RPL based internet of things","volume":"32","author":"Deshmukh-Bhosale","year":"2019","journal-title":"Procedia Manuf."},{"key":"10.1016\/j.comnet.2025.111968_bib0063","series-title":"2018 3Rd International Conference for Convergence in Technology (I2CT)","first-page":"1","article-title":"Trust based mechanism for securing IoT routing protocol RPL against wormhole &grayhole attacks","author":"Mehta","year":"2018"},{"issue":"1","key":"10.1016\/j.comnet.2025.111968_bib0064","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1186\/s13638-016-0776-0","article-title":"Detection of wormhole attacks on IPv6 mobility-based wireless sensor network","volume":"2016","author":"Lai","year":"2016","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"S3","key":"10.1016\/j.comnet.2025.111968_bib0065","doi-asserted-by":"crossref","first-page":"100","DOI":"10.51983\/ajcst-2019.8.S3.2075","article-title":"Acknowledgement based technique for detection of the wormhole attack in RPL based internet of things networks","volume":"8","author":"Neerugatti","year":"2019","journal-title":"Asian J. Comput. Sci. Technol."},{"issue":"2","key":"10.1016\/j.comnet.2025.111968_bib0066","doi-asserted-by":"crossref","first-page":"1303","DOI":"10.1007\/s10586-021-03528-5","article-title":"Mitigating the worst parent attack in RPL based internet of things","volume":"25","author":"Sahay","year":"2022","journal-title":"Cluster Comput."},{"issue":"12","key":"10.1016\/j.comnet.2025.111968_bib0067","doi-asserted-by":"crossref","first-page":"11536","DOI":"10.1109\/JIOT.2020.3022276","article-title":"Enhancing routing security in IoT: performance evaluation of RPL\u00e2\u20ac \u2122s secure mode under attacks","volume":"7","author":"Raoof","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"10.1016\/j.comnet.2025.111968_bib0068","article-title":"Hybrid deep learning-Based intrusion detection system for RPL IoT networks","volume":"12","author":"Al Sawafi","year":"2023","journal-title":"J. Sensor Actuator Netw."},{"issue":"4","key":"10.1016\/j.comnet.2025.111968_bib0069","doi-asserted-by":"crossref","first-page":"2235","DOI":"10.1007\/s11277-024-11009-2","article-title":"A lightweight cooperative intrusion detection system for rpl-based iot","volume":"134","author":"Azzaoui","year":"2024","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.comnet.2025.111968_bib0070","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2025.111185","article-title":"Enhancing IoT security: a competitive coevolutionary strategy for detecting RPL attacks in challenging attack environments","volume":"262","author":"Y\u0131lmaz","year":"2025","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2025.111968_bib0071","doi-asserted-by":"crossref","DOI":"10.1109\/JIOT.2025.3553194","article-title":"Exploring and enhancing placement of IDS in RPL: a federated learning-Based approach","author":"Y\u0131lmaz","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2025.111968_bib0072","series-title":"2017 International Conference on Information and Communication Technologies (ICICT)","first-page":"58","article-title":"Wormhole attack detection in routing protocol for low power lossy networks","author":"Ahsan","year":"2017"},{"key":"10.1016\/j.comnet.2025.111968_bib0073","unstructured":"C. Thomson, I. Romdhani, A. Al-Dubai, M. Qasem, B. Ghaleb, I. Wadhaj, Cooja simulator manual (2016)."},{"key":"10.1016\/j.comnet.2025.111968_bib0074","series-title":"International Conference on Information Technology and Development of Education\u2013ITRO","article-title":"Running and testing applications for contiki OS using cooja simulator","volume":"2016","author":"Velinov","year":"2016"},{"issue":"15","key":"10.1016\/j.comnet.2025.111968_bib0075","doi-asserted-by":"crossref","first-page":"5952","DOI":"10.1109\/JSEN.2019.2910881","article-title":"RPL-Based routing protocols in IoT applications: a review","volume":"19","author":"Kharrufa","year":"2019","journal-title":"IEEE Sens. J."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128625009338?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128625009338?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T03:34:30Z","timestamp":1770348870000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128625009338"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":75,"alternative-id":["S1389128625009338"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2025.111968","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2026,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An efficient and reliable mechanism for Wormhole detection in RPL based IoT networks","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2025.111968","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111968"}}