• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

RPL rank based-attack mitigation scheme in IoT environment.

Mohammed Amine BoudouaiaAbdelhafid AbouaissaAdda Ali-PachaAyoub BenayachePascal Lorenz
Published in: Int. J. Commun. Syst. (2021)
Keyphrases
  • management system
  • real time
  • authentication protocol
  • data mining
  • robotic systems
  • risk management
  • complex environments
  • countermeasures
  • secret key