2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN) 2019
DOI: 10.1109/icufn.2019.8806168
|View full text |Cite
|
Sign up to set email alerts
|

Formal Modeling of Greedy Behavior in Secure Internet of Things Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…We have selected the most recent works in the literature to present in this section. Works [ 10 , 11 , 12 , 13 ] focus on the characterization and modelling of the greedy behaviour attack.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We have selected the most recent works in the literature to present in this section. Works [ 10 , 11 , 12 , 13 ] focus on the characterization and modelling of the greedy behaviour attack.…”
Section: Related Workmentioning
confidence: 99%
“…In [ 12 ], the authors propose a UPPAAL model of the greedy node in a WSN network using the IEEE 802.15.4e standard and star topology. Authors were particularly interested in the beacon-activated mode contention access period of slotted CSMA-CA.…”
Section: Related Workmentioning
confidence: 99%
“…The major advantages of this technique is that it can be executed by any node of the network and does not require any modification of the IEEE 802.11p standard. Another proposal is UPPAAL model [150] which is interested in the contention access period of the beacon-enabled mode of the slotted CSMA-CA. The developed model…”
Section: Availability Attacks and Proposed Solutionsmentioning
confidence: 99%