Login / Signup
DDoS attack aware environment with secure clustering and routing based on RPL protocol operation.
Basim Ahmad Alabsi
Mohammed Anbar
Selvakumar Manickam
Omar E. Elejla
Published in:
IET Circuits Devices Syst. (2019)
Keyphrases
</>
network layer
secure routing
ddos attacks
denial of service attacks
cryptographic protocols
application layer
lightweight
covert channel
security protocols
key distribution
routing protocol
authentication protocol
ad hoc networks
network services
scalar product
ip addresses
key agreement protocol