2019 Chinese Control Conference (CCC) 2019
DOI: 10.23919/chicc.2019.8866139
|View full text |Cite
|
Sign up to set email alerts
|

Cuckoo-RPL: Cuckoo Filter based RPL for Defending AMI Network from Blackhole Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…Privacy Preserving: Zhang et al proposed a mechanism Cuckoo-RPL (Routing Protocol for Low-Power and Lossy Networks) to defend from Advanced metering infrastructure (AMI) network from blackhole attack. Cuckoo-RPL is also useful to defend from other attacks like version number and gray hole attack [303].…”
Section: Applications Of Pds In Smart Energymentioning
confidence: 99%
“…Privacy Preserving: Zhang et al proposed a mechanism Cuckoo-RPL (Routing Protocol for Low-Power and Lossy Networks) to defend from Advanced metering infrastructure (AMI) network from blackhole attack. Cuckoo-RPL is also useful to defend from other attacks like version number and gray hole attack [303].…”
Section: Applications Of Pds In Smart Energymentioning
confidence: 99%
“…Moreover, time complexity for basic stack operations, such as push and pop is O (1), as it is possible to work at only one end of this linear data structure. The cuckoo filter [58] is considered a better option than the bloom filter in three ways. It supports the dynamic deletion of items.…”
Section: Benefits Of Implementing the Morton Filtermentioning
confidence: 99%
“…Because of the difficulty in debugging and implementing IoTs in real networks, it is necessary to view simulations as a basic design tool. The primary benefit of simulation is that analysis is simplified and protocol is verified, mostly, it is evident in systems in large scales [28][29][30][31][32][33][34][35]. The performance of the suggested method is assessed in this part by the use of NS-3 as the simulation means, and the discussion on the obtained results is presented.…”
Section: Simulation Setup and Comparing Algorithmsmentioning
confidence: 99%