Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
topological isolation
biblio
Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT
Submitted by
grigby1
on Wed, 01/16/2019 - 1:25pm
6LoWPAN
attack graph
communication protocol
composability
computer network security
destination oriented directed acyclic graphs
directed graphs
expected transmission count
holistic security assessment
Internet of Things
IoT networks
IP networks
IPv6 Routing Protocol
LLNs
loop free topology
low-power wireless personal area network
network topology
objective function
packet delivery rate
personal area networks
pubcrawl
rank based data path validation
rank property
Resiliency
resource constrained Low Power and Lossy Networks
resource consumption
Routing
routing path optimization
Routing protocols
routing requirements
routing security
RPL attacks
RPL DODAG
RPL-6LOWPAN
security
security attacks
security breaches
sensor nodes
telecommunication network topology
topological isolation
topological sub-optimization
traffic disruption
vulnerability assessment