Login / Signup
Secure Routing in IoT: Evaluation of RPL's Secure Mode under Attacks.
Ahmed Raoof
Ashraf Matrawy
Chung-Horng Lung
Published in:
GLOBECOM (2019)
Keyphrases
</>
secure routing
ad hoc networks
biological inspired
routing protocol
key management
residual energy
routing scheme
response time
real time
wireless sensor networks
management system
wireless networks
computer networks
security protocols