The 6L0WPAN adaptation layer is widely used in many Internet of Things (IoT) and vehicular networking applications. The current IoT framework [1], which introduced 6LoWPAN to the TCP/IP model, does not specif the implementation for managing its received-fragments buffer. This paper looks into the effect of current implementations of buffer management strategies at 6LoWPAN's response in case of fragmentation-based, buffer reservation Denial of Service (DoS) attacks. The Packet Drop Rate (PDR) is used to analyze how successful the attacker is for each management technique. Our investigation uses different defence strategies, which include our implementation of the Split Buffer mechanism [2] and a modified version of this mechanism that we dev...
A packet buffer for the protocol processor is a large memory space that holds incoming data packets ...
Part 1: Network Security and Cyber AttacksInternational audienceSoftware Defined Networks (SDN) faci...
Abstract: In this paper, we propose a new mechanism to combat pulsing Denial-of-Service (DoS) at-tac...
Router queues buffer packets during congestion epochs. A recent result by Appenzeller et al. showed ...
Abstract- Recently, several papers have studied the possibility of shrinking buffer sizes in Interne...
Provisioning buffer management mechanism is especially crucial in resource-constrained delay toleran...
The Internet of Things (IoT) presents a new paradigm of the future Internet that intends to provide ...
Keeping the delay experienced by packets while travelling from a source to a destination below certa...
The 6TiSCH architecture defined by the IETF provides a standard solution for extending the Internet ...
Internet of Things (IoT) process technology is a rapidly emerging technology with great benefits for...
Abstract. In this paper, we study the performance of timeout-based queue management practices in the...
Among various types of denial of service attacks, “dropping attack ” is probably the most difficult ...
IP traceback is one of the defense mechanisms for Distributed Denial of Service (DDoS) attacks. Howe...
© 2019 Elsevier Ltd Stateful forwarding plane is fully considered as a novel forwarding paradigm, wh...
With the development of social networks, more and more mobile social network devices have multiple i...
A packet buffer for the protocol processor is a large memory space that holds incoming data packets ...
Part 1: Network Security and Cyber AttacksInternational audienceSoftware Defined Networks (SDN) faci...
Abstract: In this paper, we propose a new mechanism to combat pulsing Denial-of-Service (DoS) at-tac...
Router queues buffer packets during congestion epochs. A recent result by Appenzeller et al. showed ...
Abstract- Recently, several papers have studied the possibility of shrinking buffer sizes in Interne...
Provisioning buffer management mechanism is especially crucial in resource-constrained delay toleran...
The Internet of Things (IoT) presents a new paradigm of the future Internet that intends to provide ...
Keeping the delay experienced by packets while travelling from a source to a destination below certa...
The 6TiSCH architecture defined by the IETF provides a standard solution for extending the Internet ...
Internet of Things (IoT) process technology is a rapidly emerging technology with great benefits for...
Abstract. In this paper, we study the performance of timeout-based queue management practices in the...
Among various types of denial of service attacks, “dropping attack ” is probably the most difficult ...
IP traceback is one of the defense mechanisms for Distributed Denial of Service (DDoS) attacks. Howe...
© 2019 Elsevier Ltd Stateful forwarding plane is fully considered as a novel forwarding paradigm, wh...
With the development of social networks, more and more mobile social network devices have multiple i...
A packet buffer for the protocol processor is a large memory space that holds incoming data packets ...
Part 1: Network Security and Cyber AttacksInternational audienceSoftware Defined Networks (SDN) faci...
Abstract: In this paper, we propose a new mechanism to combat pulsing Denial-of-Service (DoS) at-tac...