Login / Signup
IB-RPL: Embedding Isolation and Blacklisting of Malicious Nodes in RPL for Securing IoT-LLNs.
Rashmi Sahay
G. Geethakumari
Barsha Mitra
Published in:
ANTS (2021)
Keyphrases
</>
management system
malicious nodes
malicious behavior
digital libraries
computer systems
data mining
mobile phone
context aware
location information