Proceedings of the 4th International Workshop on Trustworthy Embedded Devices 2014
DOI: 10.1145/2666141.2666143
|View full text |Cite
|
Sign up to set email alerts
|

6LoWPAN Security

Abstract: 6LoWPAN networks are 802.15.4-based wireless sensor networks that seamlessly integrate with IPv6 networks using specially designed protocols. Unfortunately, 6LoWPAN networks are vulnerable to hidden wormholes. To detect and subsequently avoid hidden wormholes, Jain et al. recently proposed two schemes, which exploit the reciprocity of received signal strength indicators (RSSIs). However, threats and attacks can mislead Jain et al.'s schemes into reaching false positives or false negatives. Moreover, their sche… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(1 citation statement)
references
References 41 publications
(56 reference statements)
0
1
0
Order By: Relevance
“…if a node y can receive a message from z, then it can also send a message to z. We assume that the channel, based on MAC protocols [25], between the sensor nodes is reliable. That is, the signals sent from different sensor nodes across the same channel do not collide.…”
Section: Problem Statementmentioning
confidence: 99%
“…if a node y can receive a message from z, then it can also send a message to z. We assume that the channel, based on MAC protocols [25], between the sensor nodes is reliable. That is, the signals sent from different sensor nodes across the same channel do not collide.…”
Section: Problem Statementmentioning
confidence: 99%