Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Apr 29, 2021 · Title:Integrating 6LoWPAN Security with RPL Using The Chained Secure Mode Framework. Authors:Ahmed Raoof, Chung-Horng Lung, Ashraf Matrawy.
Abstract—The IPv6 over Low-powered Wireless Personal Area. Network (6LoWPAN) protocol was introduced to allow the trans-.
A security integration between 6LoWPAN and the Routing Protocol for Low Power and Lossy Networks (RPL) through the Chained Secure Mode (CSM) framework is ...
In this paper, we propose a novel secure mode for RPL, the Chained Secure Mode (CSM), based on the concept of intra-flow Network Coding. The goal of CSM is to ...
This paper proposes a security integration between 6LoWPAN and the Routing Protocol for Low Power and Lossy Networks (RPL) through the Chained Secure Mode (CSM) ...
People also ask
The Chained Secure Mode Framework ... any security measures, not even authenticating the fragments' (WH) attacks [10]), which opens the door for more use cases,
Securing RPL using Network Coding: The Chained Secure Mode (CSM). A Raoof, CH ... Integrating 6LoWPAN Security with RPL Using The Chained Secure Mode Framework.
from publication: Integrating 6LoWPAN Security with RPL Using The Chained Secure Mode Framework | The IPv6 over Low-powered Wireless Personal Area Network ( ...
A novel secure mode for RPL, the chained secure mode (CSM), is proposed using the concept of intraflow network coding (NC), designed to enhance RPL's ...