C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Evaluation of Feasibility and Impact of Attacks Against the 6top Protocol in 6TiSCH Networks.
Gioele Carignani
Francesca Righetti
Carlo Vallati
Marco Tiloca
Giuseppe Anastasi
Published in:
WoWMoM (2020)
Keyphrases
</>
cryptographic protocols
network protocols
denial of service attacks
social networks
countermeasures
network structure
complex networks
security protocols
communication protocol
lightweight
network topologies
secure routing