Articles with "selective forwarding" as a keyword



Photo from wikipedia

Security Challenges of Selective Forwarding Attack and Design a Secure ECDH-Based Authentication Protocol to Improve RPL Security

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2022.3221434

Abstract: Today, we could describe the Internet of Things (loT) as the pervasive and global network that provides a system for monitoring, controlling, processing, and analyzing the data generated by IoT devices. The huge amount of… read more here.

Keywords: authentication; selective forwarding; security; design secure ... See more keywords