Performance Evaluation of RPL Protocol under Mobile Sybil Attacks.
Faiza MedjekDjamel TandjaouiImed RomdhaniNabil DjedjigPublished in: TrustCom/BigDataSE/ICESS (2017)
Keyphrases
- cryptographic protocols
- security protocols
- secure routing
- malicious users
- denial of service attacks
- wireless medium
- mobile payment
- mobile phone
- mobile devices
- attack scenarios
- cryptographic algorithms
- countermeasures
- lightweight
- mobile applications
- mobile nodes
- mobile users
- watermarking scheme
- routing protocol
- mobile computing
- remote server
- attack detection
- mobile services
- mobile learning
- wireless link
- security threats
- mobile commerce
- computing environments
- authentication protocol
- delay tolerant
- ad hoc networking
- data dissemination
- application layer
- standard model
- watermarking algorithm