2022
DOI: 10.1016/j.micpro.2022.104675
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Impact of DIS flooding Attack on RPL-based 6LowPAN Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 17 publications
0
0
0
Order By: Relevance
“…Different evaluation studies have shown the potential damages of flooding attacks. A common example is the DISF attack, which can adversely decrease PDR and increase delay and energy consumption as indicated by the experimental results in [51,52]. The results in [53] demonstrated the ability of the DISF attack to highly degrade energy consumption in addition to nodes' DODAG attachment time.…”
Section: Related Workmentioning
confidence: 94%
“…Different evaluation studies have shown the potential damages of flooding attacks. A common example is the DISF attack, which can adversely decrease PDR and increase delay and energy consumption as indicated by the experimental results in [51,52]. The results in [53] demonstrated the ability of the DISF attack to highly degrade energy consumption in addition to nodes' DODAG attachment time.…”
Section: Related Workmentioning
confidence: 94%
“…In [29], the author covered the DIS flooding attack debated in this paper portentous that swelling the numeral of attacker nodes has an evident negative effect on end-toend delay, packet detection ratio, and power consumption.…”
Section: Review Of Literaturementioning
confidence: 99%
“…RPL utilises the IEEE 802.15.4 standard and the 6LoWPAN adaptation layer to provide a longdistance vector protocol optimised for IPv6 low-power devices. Motivated by the desire to improve coordination between many nodes in a peer-to-peer or renewed star network [38]- [40], the routing over LLNs (RoLL) working group presented the routing requirements for low power and lossy networks (LLNs) in public, factoring in the disadvantage of powering, processing, and mind resources. With this protocol, the network's nodes are organised into a hierarchical structure with multiple intermediate nodes, allowing any node to broadcast information to its parent [41], [42], which will then forward it to the next higher level, ultimately reaching the gateway or sink node.…”
Section: Description Of Rpl 31 Overview Of Rplmentioning
confidence: 99%