Login / Signup

RPL rank based-attack mitigation scheme in IoT environment.

Mohammed Amine BoudouaiaAbdelhafid AbouaissaAdda Ali-PachaAyoub BenayachePascal Lorenz
Published in: Int. J. Commun. Syst. (2021)
Keyphrases
  • management system
  • real time
  • authentication protocol
  • data mining
  • robotic systems
  • risk management
  • complex environments
  • countermeasures
  • secret key