2018 IEEE 4th International Conference on Computer and Communications (ICCC) 2018
DOI: 10.1109/compcomm.2018.8780655
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability of Complex Networks under Neighbor Nodes Attack Strategies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…The node receiving this packet may think that a new neighbor has sent this message. He may want to add this node to his list of potential parents or choose him as the preferred parent if that node may not be within the range of the victim node [110].…”
Section: Rpl Protocol-specific Attacksmentioning
confidence: 99%
“…The node receiving this packet may think that a new neighbor has sent this message. He may want to add this node to his list of potential parents or choose him as the preferred parent if that node may not be within the range of the victim node [110].…”
Section: Rpl Protocol-specific Attacksmentioning
confidence: 99%