The Internet of Things (IoT) presents a new paradigm of the future internet that intends to provide interactive communication between various processing object via heterogeneous networks. The routing protocol in the IoT environment is Routing Protocol for Low-Power and Lossy Networks (RPL). The current RPL specification defines primary security modes; therefore it is vulnerable to topological attacks. In this paper the RPL routing mechanism, its topological vulnerabilities and two important topological attacks namely version number attack and rank spoofing attack are analyzed. To counter the mentioned attacks, a lightweight Identity Based Offline�Online Signature based scheme is proposed. Our evaluation shows that our proposed scheme is s...
This paper focuses on the security aspect of RPL (Routing Protocol for Low-power and lossy network) ...
The Routing Protocol for Low-Power and Lossy Networks (RPL) has gained in popularity since the incre...
Due to recent notorious security threats, like Mirai-botnet, it is challenging to perform efficient ...
The Internet of Things (IoT) presents a new paradigm of the future internet that intends to provide ...
The recent bloom of Internet of Things (IoT) and its prevalence in many security-sensitive environme...
Lossy Networks was recently introduced as the new routing standard for the Internet of Things. Altho...
International audienceData transportation and routing in Internet of Things (IoT) is a challenging i...
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is vulnerable ...
The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was recently introduced as the new ...
The Internet of Things (IoT) and its relevant advances have attracted significant scholarly, governm...
The Internet of Things (IoT) paradigm facilitates communication for a multitude of connected smart o...
The present work describes a new technique to mitigate the version number attack (VNA), which is cla...
The Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol standardized...
The Internet of Things (IoT) and its relevant advances have attracted significant scholarly, governm...
The Internet of Things (IoT) and its relevant advances have attracted significant scholarly, governm...
This paper focuses on the security aspect of RPL (Routing Protocol for Low-power and lossy network) ...
The Routing Protocol for Low-Power and Lossy Networks (RPL) has gained in popularity since the incre...
Due to recent notorious security threats, like Mirai-botnet, it is challenging to perform efficient ...
The Internet of Things (IoT) presents a new paradigm of the future internet that intends to provide ...
The recent bloom of Internet of Things (IoT) and its prevalence in many security-sensitive environme...
Lossy Networks was recently introduced as the new routing standard for the Internet of Things. Altho...
International audienceData transportation and routing in Internet of Things (IoT) is a challenging i...
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is vulnerable ...
The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was recently introduced as the new ...
The Internet of Things (IoT) and its relevant advances have attracted significant scholarly, governm...
The Internet of Things (IoT) paradigm facilitates communication for a multitude of connected smart o...
The present work describes a new technique to mitigate the version number attack (VNA), which is cla...
The Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol standardized...
The Internet of Things (IoT) and its relevant advances have attracted significant scholarly, governm...
The Internet of Things (IoT) and its relevant advances have attracted significant scholarly, governm...
This paper focuses on the security aspect of RPL (Routing Protocol for Low-power and lossy network) ...
The Routing Protocol for Low-Power and Lossy Networks (RPL) has gained in popularity since the incre...
Due to recent notorious security threats, like Mirai-botnet, it is challenging to perform efficient ...