Detecting Rules-related Attacks in RPL-based Resource-Constrained Wireless Networks.
Areej AlthubaityReda AmmarSong HanPublished in: ISSPIT (2020)
Keyphrases
- wireless networks
- resource constrained
- security mechanisms
- wireless communication
- wireless sensor networks
- sensor networks
- resource constraints
- base station
- ad hoc networks
- mobile computing
- wired networks
- key management
- network coding
- mobile networks
- cellular networks
- multimedia services
- wireless technologies
- multipath
- cross layer
- low bandwidth
- sensor nodes
- data collection
- cooperative