Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review.
Abhishek VermaVirender RangaPublished in: CoRR (2023)
Keyphrases
- key technologies
- enterprise network
- statistical databases
- social networks
- access control
- security mechanisms
- complex networks
- network security
- network analysis
- computer networks
- security issues
- heterogeneous networks
- information security
- end to end
- intrusion detection
- security requirements
- open source
- key management
- network layer
- low rate
- information systems