Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RPL attacks
biblio
A Classification of RPL Specific Attacks and Countermeasures in the Internet of Things
Submitted by grigby1 on Tue, 12/06/2022 - 1:52pm
pubcrawl
6LoWPAN
composability
Internet of Things
Internet of Things (IoT)
Mitigations in RPL
resilience
Resiliency
Routing
Routing protocols
RPL
RPL attacks
smart cities
Wireless communication
Wireless personal area networks
wireless sensor networks
biblio
SMTrust: Proposing Trust-Based Secure Routing Protocol for RPL Attacks for IoT Applications
Submitted by grigby1 on Mon, 11/08/2021 - 3:47pm
Resiliency
composability
Internet of Things
IoT
IoT security
Measurement
Mobility Metrics
pubcrawl
resilience
wireless sensor networks
Routing
Routing protocols
RPL attacks
Scalability
security
Transportation
trust
Trust Routing
biblio
Simulating RPL Attacks in 6lowpan for Detection Purposes
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
electronic devices
RPL protocol functioning
RPL attacks
routing protocol for low-power and lossy networks
IPv6 over low-power wireless personal area networks
Cooja Simulator
contiki operating system
attack condition
6LoWPAN networks
Resiliency
Packet loss
WSN
network components
personal area networks
LLN
telecommunication network topology
routing attacks
6LoWPAN
Cybersecurity
Routing
wireless sensor networks
Routing protocols
composability
pubcrawl
IoT devices
Internet of Things
IP networks
computer network security
biblio
Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT
Submitted by grigby1 on Wed, 01/16/2019 - 1:25pm
RPL DODAG
rank property
Resiliency
resource constrained Low Power and Lossy Networks
resource consumption
Routing
routing path optimization
Routing protocols
routing requirements
routing security
RPL attacks
rank based data path validation
RPL-6LOWPAN
security
security attacks
security breaches
sensor nodes
telecommunication network topology
topological isolation
topological sub-optimization
traffic disruption
vulnerability assessment
IP networks
attack graph
communication protocol
composability
computer network security
destination oriented directed acyclic graphs
directed graphs
expected transmission count
holistic security assessment
Internet of Things
IoT networks
6LoWPAN
IPv6 Routing Protocol
LLNs
loop free topology
low-power wireless personal area network
network topology
objective function
packet delivery rate
personal area networks
pubcrawl