Dergi makalesi Açık Erişim
Aris, Ahmet; Yalcin, Siddika Berna Ors; Oktug, Sema F.
{ "conceptrecid": "112215", "created": "2021-04-20T14:30:34.329433+00:00", "doi": "10.1016/j.adhoc.2018.10.022", "files": [ { "bucket": "803031e4-841d-481c-a5a8-6581907868dc", "checksum": "md5:0ba1fd28030af07e58389e940cc50989", "key": "bib-acc377bd-ea4c-4656-89f6-b70acc6e7967.txt", "links": { "self": "https://aperta.ulakbim.gov.tr/api/files/803031e4-841d-481c-a5a8-6581907868dc/bib-acc377bd-ea4c-4656-89f6-b70acc6e7967.txt" }, "size": 144, "type": "txt" } ], "id": 112216, "links": { "badge": "https://aperta.ulakbim.gov.tr/badge/doi/10.1016/j.adhoc.2018.10.022.svg", "bucket": "https://aperta.ulakbim.gov.tr/api/files/803031e4-841d-481c-a5a8-6581907868dc", "doi": "https://doi.org/10.1016/j.adhoc.2018.10.022", "html": "https://aperta.ulakbim.gov.tr/record/112216", "latest": "https://aperta.ulakbim.gov.tr/api/records/112216", "latest_html": "https://aperta.ulakbim.gov.tr/record/112216" }, "metadata": { "access_right": "open", "access_right_category": "success", "communities": [ { "id": "tubitak-destekli-proje-yayinlari" } ], "creators": [ { "affiliation": "Istanbul Tech Univ, Fac Comp & Informat Engn, Istanbul, Turkey", "name": "Aris, Ahmet" }, { "affiliation": "Istanbul Tech Univ, Fac Elect & Elect Engn, Istanbul, Turkey", "name": "Yalcin, Siddika Berna Ors" }, { "affiliation": "Istanbul Tech Univ, Fac Comp & Informat Engn, Istanbul, Turkey", "name": "Oktug, Sema F." } ], "description": "This paper presents two lightweight mitigation techniques for RPL Version Number Attacks (VNA) which affect the performance of IPv6-connected Low Power and Lossy Networks (LLNs) detrimentally. In RPL VNA, an attacker maliciously changes the version number of the network and thus increases delay and control message overhead and reduces network lifetime and packet delivery ratio. Simple yet effective mitigation mechanisms proposed in this paper promise significant performance improvements in an RPL network under attack. By means of the proposed techniques, the delay caused by the attacker can be shortened up to 87%, the average power consumption can be reduced up to 63%, the control message overhead can be lowered up to 71% and the data packets delivery ratio can be increased up to 86%. The proposed techniques, while allowing the ordinary RPL operation, trade off the mitigation performance against the resource overheads and thus allow network administrators to choose the right scheme for their RPL network. (C) 2018 Elsevier B.V. All rights reserved.", "doi": "10.1016/j.adhoc.2018.10.022", "has_grant": false, "journal": { "pages": "81-91", "title": "AD HOC NETWORKS", "volume": "85" }, "license": { "id": "cc-by" }, "publication_date": "2019-01-01", "relations": { "version": [ { "count": 1, "index": 0, "is_last": true, "last_child": { "pid_type": "recid", "pid_value": "112216" }, "parent": { "pid_type": "recid", "pid_value": "112215" } } ] }, "resource_type": { "subtype": "article", "title": "Dergi makalesi", "type": "publication" }, "title": "New lightweight mitigation techniques for RPL version number attacks" }, "owners": [ 1 ], "revision": 1, "stats": { "downloads": 4.0, "unique_downloads": 4.0, "unique_views": 23.0, "version_downloads": 4.0, "version_unique_downloads": 4.0, "version_unique_views": 23.0, "version_views": 23.0, "version_volume": 576.0, "views": 23.0, "volume": 576.0 }, "updated": "2021-04-20T14:30:34.384673+00:00" }
Görüntülenme | 23 |
İndirme | 4 |
Veri hacmi | 576 Bytes |
Tekil görüntülenme | 23 |
Tekil indirme | 4 |