Login / Signup
Detecting malicious proxy nodes during IoT network joining phase.
Ali Haj Hassan
Youcef Imine
Antoine Gallais
Bruno Quoitin
Published in:
Comput. Networks (2024)
Keyphrases
</>
end hosts
network structure
detecting malicious
network security
network traffic
denial of service attacks
node failures
computer networks
shortest path
wireless sensor networks
end to end
fault tolerant
network topology
mobile nodes
network bandwidth
wireless mesh networks