2021 28th IEEE International Conference on Electronics, Circuits, and Systems (ICECS) 2021
DOI: 10.1109/icecs53924.2021.9665623
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Blackhole Attack in RPL-based 6LoWPAN Network: A Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…PDAs can be classified into two categories: (i) black-hole and (ii) grey-hole attacks. In black-hole attacks, a malicious node drops all received packets from neighbouring nodes, i.e., control packets and data packets [18][19][20]; meanwhile, in grey-hole attacks, a malicious node selectively drops certain packets and forwards others [21]. One specific form of a grey-hole attack is the Selective Forwarding Attack (SFA), in which a malicious node selectively chooses which packets to discard and when to do so [22].…”
Section: Characteristics Of Low-power and Lossy Network (Llns)mentioning
confidence: 99%
“…PDAs can be classified into two categories: (i) black-hole and (ii) grey-hole attacks. In black-hole attacks, a malicious node drops all received packets from neighbouring nodes, i.e., control packets and data packets [18][19][20]; meanwhile, in grey-hole attacks, a malicious node selectively drops certain packets and forwards others [21]. One specific form of a grey-hole attack is the Selective Forwarding Attack (SFA), in which a malicious node selectively chooses which packets to discard and when to do so [22].…”
Section: Characteristics Of Low-power and Lossy Network (Llns)mentioning
confidence: 99%