Login / Signup

IB-RPL: Embedding Isolation and Blacklisting of Malicious Nodes in RPL for Securing IoT-LLNs.

Rashmi SahayG. GeethakumariBarsha Mitra
Published in: ANTS (2021)
Keyphrases
  • management system
  • malicious nodes
  • malicious behavior
  • digital libraries
  • computer systems
  • data mining
  • mobile phone
  • context aware
  • location information