Secure IoT Routing: Selective Forwarding Attacks and Trust-based Defenses in RPL Network.
Jun JiangYuhong LiuPublished in: CoRR (2022)
Keyphrases
- network layer
- secure routing
- routing protocol
- ddos attacks
- traffic analysis
- security measures
- denial of service attacks
- application layer
- computer networks
- traffic engineering
- network topologies
- network architecture
- security threats
- security mechanisms
- security problems
- routing scheme
- security issues
- dos attacks
- wireless sensor networks
- key management
- peer to peer
- data delivery
- management system
- biological inspired
- ad hoc networks
- network security
- network topology
- ip address
- chosen plaintext
- network structure
- malicious nodes
- routing algorithm
- network management
- countermeasures
- traffic load
- security protocols
- packet forwarding
- stream cipher
- denial of service
- cryptographic protocols
- mobile ad hoc networks
- wireless ad hoc networks
- trust model
- network nodes
- communication networks
- intermediate nodes
- network coding
- wireless mesh networks
- residual energy
- multi hop
- end to end delay
- encryption scheme
- shortest path