2013
DOI: 10.1109/jsen.2013.2266399
|View full text |Cite
|
Sign up to set email alerts
|

The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
72
0
3

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 148 publications
(81 citation statements)
references
References 3 publications
1
72
0
3
Order By: Relevance
“…However malicious nodes may use rank in various ways to apply D/DoS attacks. In [27] and [28], an attacker node selects the neighbor with worst rank as a preferred parent instead of choosing the one with the best rank. Thus an inefficient DODAG is created which causes delays and an increased number of control messages.…”
Section: D/dos Attacks To the Network Layermentioning
confidence: 99%
See 1 more Smart Citation
“…However malicious nodes may use rank in various ways to apply D/DoS attacks. In [27] and [28], an attacker node selects the neighbor with worst rank as a preferred parent instead of choosing the one with the best rank. Thus an inefficient DODAG is created which causes delays and an increased number of control messages.…”
Section: D/dos Attacks To the Network Layermentioning
confidence: 99%
“…Le et al analyzed the rank attack in [28] in RPL networks in 2013. In this work, they applied the rank attacks with different cases where the attacker constantly applies the attack or switches between legitimate and malicious behaviors frequently.…”
Section: Studies That Analyze D/dos Attacks For Internet Of Thingsmentioning
confidence: 99%
“…Mahbubul Alam et al [4] investigated the fundamental differences of M2M and IoT by starting out with surveying some of the drivers and moving into an analysis. The performance of the AODV (Ad-hoc On-demand Distance Vector) routing protocol was evaluated with respect to the variation in node concentration Galzarano et al [5].Maria Rita Palattella et al [6] implemented Standardized Protocol Stack for the Internet of (Important) Things which introduces in a timely manner and for the first time the wireless communications stack the industry believes to meet the important criteria of power-efficiency.Different types ©IJRASET (UGC Approved Journal): All Rights are Reserved of the Rank attacks can be used to intentionally downgrade specific QoS parameters implemented by Anhtuan Le et al [7]. A globalcoverage M2M healthcare system was successfully implemented Sang-Joong Jung et al [8] by using wearable physiological sensors based on the 6LoWPAN protocol.…”
Section: A Sensor Node Usually Consists Of Three Sub-systems 1) Compmentioning
confidence: 99%
“…As a result, the protocol is also proposed to apply in a lot of other situations such as Smart Grid and so on. For the overall operation of the protocol as well as the basic concepts of routing messages like DIO, DIS, and the trickle algorithm, readers can refer to [1][2][3][4][5][6][7][8] for more detail.…”
Section: Introductionmentioning
confidence: 99%