{"id":"https://openalex.org/W2794582381","doi":"https://doi.org/10.1109/comsnets.2018.8328194","title":"Analysis and enhancement of RPL under packet drop attacks","display_name":"Analysis and enhancement of RPL under packet drop attacks","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2794582381","doi":"https://doi.org/10.1109/comsnets.2018.8328194","mag":"2794582381"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets.2018.8328194","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2018.8328194","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 10th International Conference on Communication Systems &amp; Networks (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100687673","display_name":"Binbin Chen","orcid":"https://orcid.org/0000-0002-9584-0082"},"institutions":[{"id":"https://openalex.org/I4210108443","display_name":"Advanced Digital Sciences Center","ror":"https://ror.org/01xaqx887","country_code":"SG","type":"facility","lineage":["https://openalex.org/I4210108443"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Binbin Chen","raw_affiliation_strings":["Advanced Digital Sciences Center"],"affiliations":[{"raw_affiliation_string":"Advanced Digital Sciences Center","institution_ids":["https://openalex.org/I4210108443"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101608174","display_name":"Yuan Li","orcid":"https://orcid.org/0000-0003-0477-0806"},"institutions":[{"id":"https://openalex.org/I4210108443","display_name":"Advanced Digital Sciences Center","ror":"https://ror.org/01xaqx887","country_code":"SG","type":"facility","lineage":["https://openalex.org/I4210108443"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yuan Li","raw_affiliation_strings":["Advanced Digital Sciences Center"],"affiliations":[{"raw_affiliation_string":"Advanced Digital Sciences Center","institution_ids":["https://openalex.org/I4210108443"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049285151","display_name":"Daisuke Mashima","orcid":"https://orcid.org/0000-0003-1946-1790"},"institutions":[{"id":"https://openalex.org/I4210108443","display_name":"Advanced Digital Sciences Center","ror":"https://ror.org/01xaqx887","country_code":"SG","type":"facility","lineage":["https://openalex.org/I4210108443"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Daisuke Mashima","raw_affiliation_strings":["Advanced Digital Sciences Center"],"affiliations":[{"raw_affiliation_string":"Advanced Digital Sciences Center","institution_ids":["https://openalex.org/I4210108443"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100687673"],"corresponding_institution_ids":["https://openalex.org/I4210108443"],"apc_list":null,"apc_paid":null,"fwci":0.5842,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.70432518,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"167","last_page":"174"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7642791271209717},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7403320670127869},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.7201926112174988},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6994224786758423},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.6589159965515137},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.6089295148849487},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.5474817752838135},{"id":"https://openalex.org/keywords/drop","display_name":"Drop (telecommunication)","score":0.4931020438671112},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4253961443901062},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.41145309805870056},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29422152042388916},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2497226893901825},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08015471696853638}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7642791271209717},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7403320670127869},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.7201926112174988},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6994224786758423},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.6589159965515137},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.6089295148849487},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.5474817752838135},{"id":"https://openalex.org/C2781345722","wikidata":"https://www.wikidata.org/wiki/Q5308388","display_name":"Drop (telecommunication)","level":2,"score":0.4931020438671112},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4253961443901062},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.41145309805870056},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29422152042388916},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2497226893901825},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08015471696853638},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets.2018.8328194","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2018.8328194","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 10th International Conference on Communication Systems &amp; Networks (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1591370845","https://openalex.org/W1968729698","https://openalex.org/W1980108121","https://openalex.org/W1988828201","https://openalex.org/W2011315403","https://openalex.org/W2020743799","https://openalex.org/W2026609766","https://openalex.org/W2041660036","https://openalex.org/W2044304742","https://openalex.org/W2063510917","https://openalex.org/W2112833251","https://openalex.org/W2122682296","https://openalex.org/W2130090523","https://openalex.org/W2150611047","https://openalex.org/W2217512864","https://openalex.org/W2274012241","https://openalex.org/W2308388086","https://openalex.org/W2325877089","https://openalex.org/W2507735363","https://openalex.org/W2559165010","https://openalex.org/W2610120714","https://openalex.org/W6688741434"],"related_works":["https://openalex.org/W2033347526","https://openalex.org/W2588358127","https://openalex.org/W2154478511","https://openalex.org/W4234451713","https://openalex.org/W2061699822","https://openalex.org/W2521264178","https://openalex.org/W3099995967","https://openalex.org/W3037906321","https://openalex.org/W2563040182","https://openalex.org/W2026609766"],"abstract_inverted_index":{"We":[0,18,34,105],"study":[1],"the":[2,37,53,92,108,116,128,133],"performance":[3,109,142],"of":[4,110,135],"IPv6":[5],"Routing":[6],"Protocol":[7],"for":[8],"Low-Power":[9],"and":[10,74],"Lossy":[11],"Networks":[12],"(RPL)":[13],"under":[14],"packet":[15],"drop":[16,49],"attacks.":[17],"consider":[19],"an":[20,45],"external":[21],"jamming":[22],"attacker":[23,46],"who":[24],"can":[25,79],"selectively":[26],"interfere":[27],"with":[28],"traffic":[29],"around":[30],"a":[31],"targeted":[32,54,93],"router.":[33],"show":[35,87,122],"that":[36,78,88,123],"RPL":[38,113],"implementation":[39],"in":[40,66],"Contiki":[41,117],"OS":[42],"allows":[43],"such":[44,70],"to":[47,130],"continuously":[48],"packets":[50,136],"forwarded":[51],"via":[52],"router":[55,94],"without":[56,139],"triggering":[57],"any":[58],"rerouting,":[59],"even":[60],"when":[61,143],"link-layer":[62],"security":[63],"mechanisms":[64],"are":[65],"place.":[67],"To":[68],"counter":[69],"attacks,":[71],"we":[72,86],"design":[73],"analyze":[75],"additional":[76],"measures":[77,90,126],"be":[80],"built":[81],"on":[82],"RPL.":[83],"In":[84],"particular,":[85],"adding":[89],"at":[91,101],"is":[95,145],"more":[96],"effective":[97],"than":[98],"doing":[99],"so":[100],"affected":[102],"children":[103],"nodes.":[104],"also":[106],"evaluate":[107],"our":[111,124],"enhanced":[112],"using":[114],"Cooja,":[115],"network":[118],"simulator.":[119],"Our":[120],"results":[121],"proposed":[125],"have":[127],"potential":[129],"significantly":[131],"reduce":[132],"fraction":[134],"being":[137],"dropped":[138],"affecting":[140],"RPL's":[141],"there":[144],"no":[146],"attack.":[147]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
