Login / Signup
RPL rank based-attack mitigation scheme in IoT environment.
Mohammed Amine Boudouaia
Abdelhafid Abouaissa
Adda Ali-Pacha
Ayoub Benayache
Pascal Lorenz
Published in:
Int. J. Commun. Syst. (2021)
Keyphrases
</>
management system
real time
authentication protocol
data mining
robotic systems
risk management
complex environments
countermeasures
secret key