2018
DOI: 10.1007/s12243-018-0645-4
|View full text |Cite
|
Sign up to set email alerts
|

Detection of rank attack in routing protocol for Low Power and Lossy Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
90
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 58 publications
(99 citation statements)
references
References 20 publications
0
90
0
Order By: Relevance
“…This work will propose and implement a mechanism for secure RPL routing protocols. It will be based on and continue two pieces of research presented in [13,14] by addressing and improving their security issues, with the help of a proposed protocol called Secure Detection and Mitigation RPL Routing Protocol (SRPL-RP). The main contribution of this research is as follows:…”
Section: 2mentioning
confidence: 99%
See 4 more Smart Citations
“…This work will propose and implement a mechanism for secure RPL routing protocols. It will be based on and continue two pieces of research presented in [13,14] by addressing and improving their security issues, with the help of a proposed protocol called Secure Detection and Mitigation RPL Routing Protocol (SRPL-RP). The main contribution of this research is as follows:…”
Section: 2mentioning
confidence: 99%
“…The evaluation results indicate that ARM safeguards the RPL network with high accuracy rate. The researchers in [13] presented a Sink-Based Intrusion Detection System (SBIDS) to detect the rank attack in the RPL network. It works by the rule of comparing Node Current Rank (NCR) with Node Parent Rank (NPR), and checking the minimum rank between their siblings.…”
Section: ) Classification Based Rpl Rank Attack Modification Techniquesmentioning
confidence: 99%
See 3 more Smart Citations