{"id":"https://openalex.org/W2995689321","doi":"https://doi.org/10.1109/tencon.2019.8929409","title":"Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks","display_name":"Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2995689321","doi":"https://doi.org/10.1109/tencon.2019.8929409","mag":"2995689321"},"language":"en","primary_location":{"id":"doi:10.1109/tencon.2019.8929409","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2019.8929409","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086227422","display_name":"Abhishek Verma","orcid":"https://orcid.org/0000-0001-6687-4809"},"institutions":[{"id":"https://openalex.org/I105094715","display_name":"National Institute of Technology Kurukshetra","ror":"https://ror.org/04909p852","country_code":"IN","type":"education","lineage":["https://openalex.org/I105094715"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Abhishek Verma","raw_affiliation_strings":["National Institute of Technology,Department of Computer Engineering,Kurukshetra,India","Department of Computer Engineering, National Institute of Technology, Kurukshetra, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology,Department of Computer Engineering,Kurukshetra,India","institution_ids":["https://openalex.org/I105094715"]},{"raw_affiliation_string":"Department of Computer Engineering, National Institute of Technology, Kurukshetra, India","institution_ids":["https://openalex.org/I105094715"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036917415","display_name":"Virender Ranga","orcid":"https://orcid.org/0000-0002-2046-8642"},"institutions":[{"id":"https://openalex.org/I105094715","display_name":"National Institute of Technology Kurukshetra","ror":"https://ror.org/04909p852","country_code":"IN","type":"education","lineage":["https://openalex.org/I105094715"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Virender Ranga","raw_affiliation_strings":["National Institute of Technology,Department of Computer Engineering,Kurukshetra,India","Department of Computer Engineering, National Institute of Technology, Kurukshetra, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology,Department of Computer Engineering,Kurukshetra,India","institution_ids":["https://openalex.org/I105094715"]},{"raw_affiliation_string":"Department of Computer Engineering, National Institute of Technology, Kurukshetra, India","institution_ids":["https://openalex.org/I105094715"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5086227422"],"corresponding_institution_ids":["https://openalex.org/I105094715"],"apc_list":null,"apc_paid":null,"fwci":3.5368,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.93638004,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"552","last_page":"557"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.7713675498962402},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7693032026290894},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7639738321304321},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.6529231071472168},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.647254228591919},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.6201196312904358},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5544826984405518},{"id":"https://openalex.org/keywords/timer","display_name":"Timer","score":0.5455198287963867},{"id":"https://openalex.org/keywords/6lowpan","display_name":"6LoWPAN","score":0.49786877632141113},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.43104735016822815},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.41978779435157776},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3995993137359619},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2924046516418457},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.16291865706443787},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14757674932479858}],"concepts":[{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.7713675498962402},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7693032026290894},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7639738321304321},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.6529231071472168},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.647254228591919},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.6201196312904358},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5544826984405518},{"id":"https://openalex.org/C2776633867","wikidata":"https://www.wikidata.org/wiki/Q186612","display_name":"Timer","level":3,"score":0.5455198287963867},{"id":"https://openalex.org/C99400001","wikidata":"https://www.wikidata.org/wiki/Q109775","display_name":"6LoWPAN","level":4,"score":0.49786877632141113},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.43104735016822815},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.41978779435157776},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3995993137359619},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2924046516418457},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.16291865706443787},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14757674932479858},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C173018170","wikidata":"https://www.wikidata.org/wiki/Q165678","display_name":"Microcontroller","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tencon.2019.8929409","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2019.8929409","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.4099999964237213,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1752315353","https://openalex.org/W1976262362","https://openalex.org/W2026609766","https://openalex.org/W2038194220","https://openalex.org/W2097020578","https://openalex.org/W2105532535","https://openalex.org/W2118153514","https://openalex.org/W2274012241","https://openalex.org/W2279756469","https://openalex.org/W2325877089","https://openalex.org/W2370696599","https://openalex.org/W2559341072","https://openalex.org/W2571581135","https://openalex.org/W2616194875","https://openalex.org/W2755594459","https://openalex.org/W2790799828","https://openalex.org/W2898193194","https://openalex.org/W2904959125","https://openalex.org/W2905758037","https://openalex.org/W2920115059","https://openalex.org/W2942963954","https://openalex.org/W2965552844","https://openalex.org/W2996153566","https://openalex.org/W6744253867","https://openalex.org/W6756591515"],"related_works":["https://openalex.org/W4254092637","https://openalex.org/W2066947438","https://openalex.org/W2914063152","https://openalex.org/W3038603970","https://openalex.org/W4225146420","https://openalex.org/W2096279182","https://openalex.org/W2941353246","https://openalex.org/W3099995967","https://openalex.org/W2967432447","https://openalex.org/W2351132898"],"abstract_inverted_index":{"In":[0,19,73],"the":[1,17,21,48,68,84,95],"RPL":[2,43],"routing":[3],"protocol,":[4],"DODAG":[5,26],"Information":[6,27],"Solicitation":[7],"(DIS)":[8],"control":[9,30,98],"messages":[10],"are":[11],"sent":[12],"by":[13,52],"nodes":[14,60],"to":[15,46,61,123],"join":[16],"network.":[18],"turn,":[20],"receiver":[22],"node":[23,39],"replies":[24],"with":[25,70],"Object":[28],"(DIO)":[29],"message":[31],"after":[32],"resetting":[33],"its":[34],"trickle":[35,64],"timer.":[36],"A":[37],"malicious":[38],"can":[40,81],"utilize":[41],"this":[42,74],"protocol":[44],"behavior":[45],"perform":[47],"DIS":[49,55,106],"flooding":[50,107],"attack":[51],"sending":[53],"illegitimate":[54],"frequently":[56],"which":[57],"forces":[58],"normal":[59],"reset":[62],"their":[63],"timers":[65],"and":[66,89,101,117],"flood":[67],"network":[69],"DIO":[71],"messages.":[72],"study,":[75],"we":[76,109],"show":[77],"that":[78,115],"such":[79,119],"attacks":[80,120],"severely":[82],"degrade":[83],"performance":[85],"of":[86,94],"Low":[87],"Power":[88],"Lossy":[90],"Networks":[91],"(LLNs)":[92],"because":[93],"increase":[96],"in":[97,121],"packet":[99],"overhead":[100],"power":[102],"consumption.":[103],"To":[104],"address":[105],"attacks,":[108],"propose":[110],"a":[111],"lightweight":[112],"mitigation":[113],"scheme":[114],"detects":[116],"mitigate":[118],"order":[122],"improve":[124],"LLNs":[125],"performance.":[126]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
