Mitigation of Black Hole Attacks in Routing Protocol for Low Power and Lossy Networks.
Security and Communication Networks(2016)
Key words
RPL,black hole attack,security,suspicious,verification,mitigation
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined