An Experimental Comparison and Impact Analysis of Various RPL-Based IoT Security Threats Using Contiki Simulator.
Darshan KumarNidhi SinhaAlekha Kumar MishraAsis Kumar TripathyPublished in: COMSNETS (2024)
Keyphrases
- security threats
- impact analysis
- key management
- dependency analysis
- security issues
- source code
- software development
- security mechanisms
- management system
- cloud computing
- life cycle
- ad hoc networks
- resource constrained
- sensitive data
- secret key
- case study
- open source
- wireless sensor networks
- information security
- software systems
- signaling pathways