2017 International Conference on Intelligent Computing and Control (I2C2) 2017
DOI: 10.1109/i2c2.2017.8321851
|View full text |Cite
|
Sign up to set email alerts
|

A comparative study on RPL attacks and security solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 33 publications
(20 citation statements)
references
References 15 publications
0
20
0
Order By: Relevance
“…This attack is brutal to detect, owing to its static nature. When an unknown intruder is involved, the best way to avoid interception is to encrypt communications [124,125].…”
Section: Rpl Protocol-specific Attacksmentioning
confidence: 99%
“…This attack is brutal to detect, owing to its static nature. When an unknown intruder is involved, the best way to avoid interception is to encrypt communications [124,125].…”
Section: Rpl Protocol-specific Attacksmentioning
confidence: 99%
“…Consequently, the network constrained merits are influenced, such as the energy consumption, delay, packet delivery ratio, and control overhead [ 15 ]. Unauthorized access by attackers or third parties to data routing in the RPL networks can make the RPL security a severe problem that shall be considered [ 16 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…constrained merits are influenced such as energy consumption, delay, packets delivery ratio and control overhead [15]. Unauthorized access by attackers or third parties to data routing in the RPL networks can make the RPL security a serious problem that shall be considered [16].…”
Section: 2mentioning
confidence: 99%