C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
RPL rank based-attack mitigation scheme in IoT environment.
Mohammed Amine Boudouaia
Abdelhafid Abouaissa
Adda Ali-Pacha
Ayoub Benayache
Pascal Lorenz
Published in:
Int. J. Commun. Syst. (2021)
Keyphrases
</>
management system
real time
authentication protocol
data mining
robotic systems
risk management
complex environments
countermeasures
secret key