作者
Ahmet Aris, Sema F Oktug, S Berna Ors Yalcin
发表日期
2016/4/25
研讨会论文
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium
页码范围
776-779
出版商
IEEE
简介
In this work, we study the RPL version number attacks in-depth and analyze the attack from various points of view. The unique aspects of our work can be seen in our analysis of a realistic network topology that has both static and mobile nodes with different cardinalities for which our inspiration came from the IETF routing requirement documents. We also analyze how version number attack affects the power consumption of the nodes. We incorporated a probabilistic attacking model where the attacker attacks with a probability of p (e.g., 0, 0.3, 0.5, 0.7, 1). We also provide the performance results with respect to various values of p.
引用总数
201520162017201820192020202120222023202411107162212106
学术搜索中的文章
A Aris, SF Oktug, SBO Yalcin - NOMS 2016-2016 IEEE/IFIP Network Operations and …, 2016