On the dynamics of the RPL protocol in AMI networks under jamming attacks.
Joao R. R. RenofioMarcelo Eduardo PellenzEdgard JamhourAltair Olivo SantinManoel Camillo PennaRichard Demo SouzaPublished in: ICC (2016)
Keyphrases
- cryptographic protocols
- network protocols
- security protocols
- ambient intelligence
- secure routing
- denial of service attacks
- recurrent networks
- social networks
- end hosts
- software engineering
- delay tolerant
- lightweight
- authentication protocol
- dos attacks
- computer networks
- internet protocol
- future internet
- countermeasures
- dynamical systems
- network infrastructure
- security threats
- complex networks
- cryptographic algorithms
- attack scenarios
- mobile nodes