2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) 2020
DOI: 10.23919/softcom50211.2020.9238224
|View full text |Cite
|
Sign up to set email alerts
|

The DAO Induction Attack Against the RPL-based Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 9 publications
0
0
0
Order By: Relevance
“…In the former, malicious behavior is detected and properly mitigated by avoiding extra overhead and adding simple security mechanisms (e.g., lightweight message authentication and limitation of the forwardable messages). This is effective against topology falsification [88], excessive resource consumption [89], number of exchanged messages [90]. In the latter, instead, the routing protocol is a priori modified to avoid such issues.…”
Section: ) Low-latency Communicationsmentioning
confidence: 99%
“…In the former, malicious behavior is detected and properly mitigated by avoiding extra overhead and adding simple security mechanisms (e.g., lightweight message authentication and limitation of the forwardable messages). This is effective against topology falsification [88], excessive resource consumption [89], number of exchanged messages [90]. In the latter, instead, the routing protocol is a priori modified to avoid such issues.…”
Section: ) Low-latency Communicationsmentioning
confidence: 99%