Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

RPL DODAG

biblio

Visible to the public Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT

Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
  • RPL DODAG
  • rank property
  • Resiliency
  • resource constrained Low Power and Lossy Networks
  • resource consumption
  • Routing
  • routing path optimization
  • Routing protocols
  • routing requirements
  • routing security
  • RPL attacks
  • rank based data path validation
  • RPL-6LOWPAN
  • security
  • security attacks
  • security breaches
  • sensor nodes
  • telecommunication network topology
  • topological isolation
  • topological sub-optimization
  • traffic disruption
  • vulnerability assessment
  • IP networks
  • attack graph
  • communication protocol
  • composability
  • computer network security
  • destination oriented directed acyclic graphs
  • directed graphs
  • expected transmission count
  • holistic security assessment
  • Internet of Things
  • IoT networks
  • 6LoWPAN
  • IPv6 Routing Protocol
  • LLNs
  • loop free topology
  • low-power wireless personal area network
  • network topology
  • objective function
  • packet delivery rate
  • personal area networks
  • pubcrawl

Terms of Use  |  ©2023. CPS-VO