2017
DOI: 10.1016/j.cose.2017.05.004
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and analyses of IP spoofing attack in 6LoWPAN network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…The network communication protocols IPv4 and IPv6 have been the predecessors of 6LoWPAN that inherit the safety troubles from diverse factors, and IP spoofing became a typical attack. 6LoWPAN became an unsecured wireless medium that necessitates diverse safety factors to safeguard data transmission [11] and it became extensively implemented to get admission to point with minimum latency. The mobility control structure became proposed in [12] for effective routing protocol to acquire mobility and network topology control.…”
Section: Related Workmentioning
confidence: 99%
“…The network communication protocols IPv4 and IPv6 have been the predecessors of 6LoWPAN that inherit the safety troubles from diverse factors, and IP spoofing became a typical attack. 6LoWPAN became an unsecured wireless medium that necessitates diverse safety factors to safeguard data transmission [11] and it became extensively implemented to get admission to point with minimum latency. The mobility control structure became proposed in [12] for effective routing protocol to acquire mobility and network topology control.…”
Section: Related Workmentioning
confidence: 99%
“…According to the authors of [73], injection attacks can be conducted when an adversary attempts to delete, alter and add new manipulated data to the network, which may disrupt the smart grid operations and lead to a blackout. Violation of the data integrity, corruption, and appearance of illegitimate nodes in the network are also considered as other impacts of this type of cyber-attacks.…”
Section: Integritymentioning
confidence: 99%
“…It may exhaust the target's resources by processing the received fake messages [75]. Another impact of this attack is the lack of node functionality in the network [73].…”
Section: Integritymentioning
confidence: 99%
“…For virtual machines, an address resolution protocol (ARP) attack can cause the attacker to intercept packets to other VMs. An intrusion detection system can protect against spoofing attacks [45]. All networks attacks have a potential of causing damage to cloud computing and organizations adopting cloud computing must be particularly vigilant against these attacks.…”
Section: Network Securitymentioning
confidence: 99%