Login / Signup
Evaluation of Feasibility and Impact of Attacks Against the 6top Protocol in 6TiSCH Networks.
Gioele Carignani
Francesca Righetti
Carlo Vallati
Marco Tiloca
Giuseppe Anastasi
Published in:
WoWMoM (2020)
Keyphrases
</>
cryptographic protocols
network protocols
denial of service attacks
social networks
countermeasures
network structure
complex networks
security protocols
communication protocol
lightweight
network topologies
secure routing