Özet
In this work, we study the RPL version number attacks in-depth and analyze the attack from various points of view. The unique aspects of our work can be seen in our analysis of a realistic network topology that has both static and mobile nodes with different cardinalities for which our inspiration came from the IETF routing requirement documents. We also analyze how version number attack affects the power consumption of the nodes. We incorporated a probabilistic attacking model where the attacker attacks with a probability of p (e.g., 0, 0.3, 0.5, 0.7, 1). We also provide the performance results with respect to various values of p.
| Orijinal dil | İngilizce |
|---|---|
| Ana bilgisayar yayını başlığı | Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium |
| Editörler | Sema Oktug Badonnel, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos |
| Yayınlayan | Institute of Electrical and Electronics Engineers Inc. |
| Sayfalar | 776-779 |
| Sayfa sayısı | 4 |
| ISBN (Elektronik) | 9781509002238 |
| DOI'lar | |
| Yayın durumu | Yayınlandı - 30 Haz 2016 |
| Etkinlik | 2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016 - Istanbul, Turkey Süre: 25 Nis 2016 → 29 Nis 2016 |
Yayın serisi
| Adı | Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium |
|---|
???event.eventtypes.event.conference???
| ???event.eventtypes.event.conference??? | 2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016 |
|---|---|
| Ülke/Bölge | Turkey |
| Şehir | Istanbul |
| Periyot | 25/04/16 → 29/04/16 |
Bibliyografik not
Publisher Copyright:© 2016 IEEE.
Parmak izi
RPL version number attacks: In-depth study' araştırma başlıklarına git. Birlikte benzersiz bir parmak izi oluştururlar.Alıntı Yap
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver