2019
DOI: 10.1007/s12083-019-00792-6
|View full text |Cite
|
Sign up to set email alerts
|

Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addresses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…Monali Mavani et al [298] proposed a resilient method against spoofing attacks in 6LoWPAN networks. The authors used the time to live and Attack Disruption Window (ADW) parameters to analyze the characteristics of the spoofing attack.…”
Section: ) Spoofing Attackmentioning
confidence: 99%
“…Monali Mavani et al [298] proposed a resilient method against spoofing attacks in 6LoWPAN networks. The authors used the time to live and Attack Disruption Window (ADW) parameters to analyze the characteristics of the spoofing attack.…”
Section: ) Spoofing Attackmentioning
confidence: 99%
“…Lightweight moving target based defense mechanisms for securing resource constrained devices against targeted attacks can be explored in-depth. Also, research on achieving resilience using temporary-private IPv6 addresses [111] can be carried out.…”
Section: A Potential Areas For Future Researchmentioning
confidence: 99%
“…Mavani et al, has done several works on secure addressing and privacy preserving methodologies for IoT and Mobile environment paradigm [20,21,22]. In IoT, billions of devices can be addressed using IPv6 addressing scheme.…”
Section: Related Workmentioning
confidence: 99%
“…They analyzed the method using Cooja simulator to show that the method does not inflict much overhead for random changing of address and reconfiguration. In [21,22], they investigated the use of secure addressing and privacy mechanisms for f IPv6 over Low -Power Wireless Personal Area Networks (6LoWPAN) and designed a method to provide resilience against address spoofing and better reconfiguration time from attack disruption. They showed the efficacy of their proposal by time complexity analysis and simulation with benchmark data, but overall this does not pose much overhead to provide resilience against address spoofing.…”
Section: Related Workmentioning
confidence: 99%