Evaluating the impact of selective forwarding attacks on RPL-based 6LoWPAN in IoT: a comprehensive simulation study
RPL, an IETF-developed standard routing protocol for 6LoWPAN, is susceptible to Selective Forwarding Attacks (SFA), wherein a malicious node selectively forwards certain packets while discarding others. The detrimental impacts of SFA encompass increased overhead, latency, complexity, scalability iss...
Saved in:
Published in | Computing Vol. 107; no. 3; p. 89 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Vienna
Springer Vienna
01.03.2025
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
ISSN | 0010-485X 1436-5057 |
DOI | 10.1007/s00607-025-01440-z |
Cover
Abstract | RPL, an IETF-developed standard routing protocol for 6LoWPAN, is susceptible to Selective Forwarding Attacks (SFA), wherein a malicious node selectively forwards certain packets while discarding others. The detrimental impacts of SFA encompass increased overhead, latency, complexity, scalability issues, security risks, resource consumption, and compatibility challenges. A thorough analysis of the influence of SFA on RPL-based 6LoWPAN networks across various dimensions is essential for the research community to devise optimal solutions. In this work, we examined the adverse effects of SFA on RPL-based 6LoWPAN using a simulation-based experimental study, with six scenarios with 10%, 20%, 30%, and 50% of attacker nodes to investigate the detrimental impacts of SFA on control traffic overhead, duty cycling, latency, expected transmission rate, network convergence time, packet delivery rate, network overload, power consumption, and throughput. Our study shows that the CTO has climbed from 4.41 to 37.94%, resulting in negative network bandwidth usage. Rx and Tx duty cycles grew by 1670.71% and 341.66% across all the scenarios with attacker nodes, respectively. Latency increased by 111.58% and 108.27%, respectively, when selectively dropping control and data packets, and a maximum of 20.04% for both (control and data) packet dropping. The ETX is increased between 1.31 and 14.9% and remains the same as in the reference topology in the case of only data packet drop, indicating that the RPL’s self-healing mechanism does not affect data packet loss. In all scenarios, network convergence time increased by 46%, PDR decreased by 14.63%, network load increased by 8.14%, and the average energy consumed increased by 18.85% on average. This study further revealed that nodes positioned beyond the radio range of the sink node, which was not selected as the preferred parent, exhibited reduced energy consumption. The increase in attackers increases network throughput by 43.98% to transmit only control packets. As far as our knowledge extends, this pioneering research study thoroughly investigates the influence of RPL-specific SFA on 6LoWPAN networks across multiple dimensions, including variations in packet drop types (Data/Control), attacker deployment locations, and varying attacker quantities. |
---|---|
AbstractList | RPL, an IETF-developed standard routing protocol for 6LoWPAN, is susceptible to Selective Forwarding Attacks (SFA), wherein a malicious node selectively forwards certain packets while discarding others. The detrimental impacts of SFA encompass increased overhead, latency, complexity, scalability issues, security risks, resource consumption, and compatibility challenges. A thorough analysis of the influence of SFA on RPL-based 6LoWPAN networks across various dimensions is essential for the research community to devise optimal solutions. In this work, we examined the adverse effects of SFA on RPL-based 6LoWPAN using a simulation-based experimental study, with six scenarios with 10%, 20%, 30%, and 50% of attacker nodes to investigate the detrimental impacts of SFA on control traffic overhead, duty cycling, latency, expected transmission rate, network convergence time, packet delivery rate, network overload, power consumption, and throughput. Our study shows that the CTO has climbed from 4.41 to 37.94%, resulting in negative network bandwidth usage. Rx and Tx duty cycles grew by 1670.71% and 341.66% across all the scenarios with attacker nodes, respectively. Latency increased by 111.58% and 108.27%, respectively, when selectively dropping control and data packets, and a maximum of 20.04% for both (control and data) packet dropping. The ETX is increased between 1.31 and 14.9% and remains the same as in the reference topology in the case of only data packet drop, indicating that the RPL’s self-healing mechanism does not affect data packet loss. In all scenarios, network convergence time increased by 46%, PDR decreased by 14.63%, network load increased by 8.14%, and the average energy consumed increased by 18.85% on average. This study further revealed that nodes positioned beyond the radio range of the sink node, which was not selected as the preferred parent, exhibited reduced energy consumption. The increase in attackers increases network throughput by 43.98% to transmit only control packets. As far as our knowledge extends, this pioneering research study thoroughly investigates the influence of RPL-specific SFA on 6LoWPAN networks across multiple dimensions, including variations in packet drop types (Data/Control), attacker deployment locations, and varying attacker quantities. |
ArticleNumber | 89 |
Author | Rajkumar, S. Rajasekar, V. R. |
Author_xml | – sequence: 1 givenname: V. R. surname: Rajasekar fullname: Rajasekar, V. R. organization: School of Computer Science and Engineering, Vellore Institute of Technology – sequence: 2 givenname: S. surname: Rajkumar fullname: Rajkumar, S. email: rajkumars@vit.ac.in organization: School of Computer Science and Engineering, Vellore Institute of Technology |
BookMark | eNp9kNFKwzAUhoNMcJu-gFcBr6MnbdK03o0xdVBUZKJ3IW2TrXNrZpJOtqe3c4J3Xh04_N9_Dt8A9RrbaIQuKVxTAHHjARIQBCJOgDIGZH-C-pTFCeHARQ_1ASgQlvL3MzTwfgkAUZxmfeQnW7VqVaibOQ4Ljev1RpUBW4O9Xuky1FuNjXVfylWHiApBlR8e2wa_POekUF5XOMnt2_PoEdcNntrZLVa4tOuN0wvd-APv63W76k50kA9ttTtHp0atvL74nUP0ejeZjR9I_nQ_HY9yUkYCAmHd-4aXqckKpUXBClMJlbEkq3QRpTwTSUS7pRYs4bExBUsiVhnNmBAFpxmLh-jq2Ltx9rPVPsilbV3TnZQxFSyinKeHVHRMlc5677SRG1evldtJCvIgVx7lyk6u_JEr9x0UHyHfhZu5dn_V_1DfDCZ_uA |
Cites_doi | 10.17487/rfc4919 10.1155/2017/9324035 10.1145/3494524 10.1109/I2CT.2018.8529426 10.1016/j.adhoc.2012.02.016 10.1007/S42979-023-01799-W/METRICS 10.1109/WF-IOT.2018.8355171 10.3390/S16010118 10.1109/CSNDSP49049.2020.9249519 10.1109/AINA.2017.161 10.1007/S13369-022-07342-Y/METRICS 10.1007/978-981-15-0135-7_7 10.1007/S11277-018-5778-2 10.1109/ICCI51257.2020.9247818 10.1109/NCA.2017.8171360 10.5815/IJCNIS.2020.04.02 10.4018/IJSWIS.2017070102 10.17487/rfc6550 10.1186/S13174-019-0117-8 10.18080/ajtde.v5n1.2 10.1088/1742-6596/1142/1/012009 10.1109/ATNAC.2016.7878793 10.48550/arxiv.2201.06937 10.12968/prtu.2014.1.39.49 10.5626/KTCP.2020.26.1.20 10.1007/S11227-018-2700-3 10.1109/IWCMC.2017.7986299 10.1109/GLOCOM.2016.7841543 10.1109/I2CT45611.2019.9033926 |
ContentType | Journal Article |
Copyright | The Author(s), under exclusive licence to Springer-Verlag GmbH Austria, part of Springer Nature 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. Copyright Springer Nature B.V. Mar 2025 |
Copyright_xml | – notice: The Author(s), under exclusive licence to Springer-Verlag GmbH Austria, part of Springer Nature 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. – notice: Copyright Springer Nature B.V. Mar 2025 |
DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1007/s00607-025-01440-z |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Mathematics Computer Science |
EISSN | 1436-5057 |
ExternalDocumentID | 10_1007_s00607_025_01440_z |
GroupedDBID | -Y2 -~C -~X .4S .86 .DC .VR 06D 0R~ 0VY 1N0 1SB 2.D 203 28- 29F 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5GY 5QI 5VS 67Z 6NX 6TJ 78A 7WY 8AO 8FE 8FG 8FL 8G5 8TC 8UJ 8VB 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AAPKM AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDBE ABDBF ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACUHS ACZOJ ADHHG ADHIR ADHKG ADIMF ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMOZ AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFFNX AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHQJS AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ AKVCP ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYFIA AYJHY AZFZN AZQEC B-. B0M BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BKOMP BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DWQXO EAD EAP EBA EBLON EBR EBS EBU ECS EDO EIOEI EJD EMK EPL ESBYG EST ESX FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ7 GQ8 GUQSH GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K1G K60 K6V K6~ K7- KDC KOV KOW LAS LLZTM M0C M2O M4Y MA- MK~ ML~ N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM P19 P2P P62 P9O PF0 PHGZT PQBIZ PQBZA PQQKQ PROAC PT4 PT5 Q2X QOK QOS QWB R4E R89 R9I RHV RIG RNI RNS ROL RPX RSV RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TH9 TN5 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 ZL0 ZMTXR ~8M ~EX AAYXX ABBRH ABFSG ACSTC AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP AMVHM ATHPR CITATION PHGZM 7SC 8FD ABRTQ AFKWF JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c270t-4436f5c8f9bae7b4bfd7a9469deb285976214bfe74653ffb4624dfe4477b51943 |
IEDL.DBID | AGYKE |
ISSN | 0010-485X |
IngestDate | Sat Aug 16 19:51:10 EDT 2025 Tue Jul 01 05:14:33 EDT 2025 Wed Mar 26 01:23:23 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | 97-11 IPv6 Selective Forwarding attack 6LoWPAN IoT RPL LLN |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c270t-4436f5c8f9bae7b4bfd7a9469deb285976214bfe74653ffb4624dfe4477b51943 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 3174215584 |
PQPubID | 48322 |
ParticipantIDs | proquest_journals_3174215584 crossref_primary_10_1007_s00607_025_01440_z springer_journals_10_1007_s00607_025_01440_z |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20250300 2025-03-00 20250301 |
PublicationDateYYYYMMDD | 2025-03-01 |
PublicationDate_xml | – month: 3 year: 2025 text: 20250300 |
PublicationDecade | 2020 |
PublicationPlace | Vienna |
PublicationPlace_xml | – name: Vienna – name: Wien |
PublicationTitle | Computing |
PublicationTitleAbbrev | Computing |
PublicationYear | 2025 |
Publisher | Springer Vienna Springer Nature B.V |
Publisher_xml | – name: Springer Vienna – name: Springer Nature B.V |
References | AO Bang (1440_CR15) 2022; 55 1440_CR27 T Sakthivel (1440_CR9) 2018; 101 1440_CR24 1440_CR25 1440_CR20 1440_CR22 D Airehrour (1440_CR21) 2017; 5 A Bang (1440_CR16) 2023; 48 F Gara (1440_CR26) 2017; 13 MR Abdmeziem (1440_CR6) 2016 D Miorandi (1440_CR7) 2012; 10 1440_CR8 SOM Kamel (1440_CR29) 2020; 12 1440_CR1 1440_CR17 1440_CR2 A Mathur (1440_CR4) 2016; 16 1440_CR18 SM Muzammal (1440_CR19) 2020; 2020 V Neerugatti (1440_CR28) 2020; 1054 1440_CR12 1440_CR3 S Suhail (1440_CR10) 2020; 26 1440_CR14 1440_CR31 SY Hashemi (1440_CR33) 2018; 75 1440_CR30 P Sethi (1440_CR5) 2017; 1 1440_CR11 1440_CR32 R Stephen (1440_CR34) 2018; 1142 A Bang (1440_CR13) 2023; 4 AL Santos (1440_CR23) 2019; 10 |
References_xml | – ident: 1440_CR3 doi: 10.17487/rfc4919 – volume: 1 start-page: 25 year: 2017 ident: 1440_CR5 publication-title: J Elect Comput Eng doi: 10.1155/2017/9324035 – volume: 55 start-page: 1 issue: 2 year: 2022 ident: 1440_CR15 publication-title: ACM Comput Surv doi: 10.1145/3494524 – ident: 1440_CR20 doi: 10.1109/I2CT.2018.8529426 – volume: 10 start-page: 1497 issue: 7 year: 2012 ident: 1440_CR7 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2012.02.016 – volume: 4 start-page: 1 issue: 4 year: 2023 ident: 1440_CR13 publication-title: SN Comput Sci doi: 10.1007/S42979-023-01799-W/METRICS – ident: 1440_CR32 doi: 10.1109/WF-IOT.2018.8355171 – volume: 16 start-page: 118 issue: 1 year: 2016 ident: 1440_CR4 publication-title: Sensors doi: 10.3390/S16010118 – volume-title: Studies in Systems Decision and Control year: 2016 ident: 1440_CR6 – ident: 1440_CR22 doi: 10.1109/CSNDSP49049.2020.9249519 – ident: 1440_CR24 doi: 10.1109/AINA.2017.161 – volume: 48 start-page: 2489 issue: 2 year: 2023 ident: 1440_CR16 publication-title: Arab J Sci Eng doi: 10.1007/S13369-022-07342-Y/METRICS – volume: 1054 start-page: 67 year: 2020 ident: 1440_CR28 publication-title: Adv Intell Syst Comput doi: 10.1007/978-981-15-0135-7_7 – ident: 1440_CR30 – volume: 101 start-page: 1581 issue: 3 year: 2018 ident: 1440_CR9 publication-title: Wirel Pers Commun doi: 10.1007/S11277-018-5778-2 – volume: 2020 start-page: 305 year: 2020 ident: 1440_CR19 publication-title: Conf Comput Intell ICCI doi: 10.1109/ICCI51257.2020.9247818 – ident: 1440_CR17 – ident: 1440_CR25 doi: 10.1109/NCA.2017.8171360 – volume: 12 start-page: 11 issue: 4 year: 2020 ident: 1440_CR29 publication-title: Int J Comput Netw Inf Secur doi: 10.5815/IJCNIS.2020.04.02 – ident: 1440_CR11 – volume: 13 start-page: 22 issue: 3 year: 2017 ident: 1440_CR26 publication-title: Int J Semant Web Inf Syst doi: 10.4018/IJSWIS.2017070102 – ident: 1440_CR1 doi: 10.17487/rfc6550 – volume: 10 start-page: 1 issue: 1 year: 2019 ident: 1440_CR23 publication-title: J. Internet Serv. Appl. doi: 10.1186/S13174-019-0117-8 – volume: 5 start-page: 50 issue: 1 year: 2017 ident: 1440_CR21 publication-title: Aust J Telecommun Digit Econ doi: 10.18080/ajtde.v5n1.2 – ident: 1440_CR2 – volume: 1142 start-page: 12009 issue: 1 year: 2018 ident: 1440_CR34 publication-title: J Phys Conf Ser doi: 10.1088/1742-6596/1142/1/012009 – ident: 1440_CR31 doi: 10.1109/ATNAC.2016.7878793 – ident: 1440_CR18 doi: 10.48550/arxiv.2201.06937 – ident: 1440_CR8 doi: 10.12968/prtu.2014.1.39.49 – volume: 26 start-page: 20 issue: 1 year: 2020 ident: 1440_CR10 publication-title: J Inf Sci Computing Pract. doi: 10.5626/KTCP.2020.26.1.20 – volume: 75 start-page: 3555 issue: 7 year: 2018 ident: 1440_CR33 publication-title: J Supercomput doi: 10.1007/S11227-018-2700-3 – ident: 1440_CR14 doi: 10.1109/IWCMC.2017.7986299 – ident: 1440_CR12 doi: 10.1109/GLOCOM.2016.7841543 – ident: 1440_CR27 doi: 10.1109/I2CT45611.2019.9033926 |
SSID | ssj0002389 |
Score | 2.37255 |
Snippet | RPL, an IETF-developed standard routing protocol for 6LoWPAN, is susceptible to Selective Forwarding Attacks (SFA), wherein a malicious node selectively... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Index Database Publisher |
StartPage | 89 |
SubjectTerms | Artificial Intelligence Computer Appl. in Administrative Data Processing Computer Communication Networks Computer Science Convergence Energy consumption Information Systems Applications (incl.Internet) Network latency Nodes Packet transmission Radio range Regular Paper Software Engineering Topology Transmission rate (communications) |
Title | Evaluating the impact of selective forwarding attacks on RPL-based 6LoWPAN in IoT: a comprehensive simulation study |
URI | https://link.springer.com/article/10.1007/s00607-025-01440-z https://www.proquest.com/docview/3174215584 |
Volume | 107 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED1BWWDgG1Eo6AY2MGoSJ7HZKtTyjRCiokxRXNuAEAkiYemvx06cIhAMrIllJT777ln37h3AXpQynyvFCVdRl1Apu4SpwCeacU8wbjDp2GZ0r66j0yE9H4UjVxRWNGz3JiVZeeppsZuVDomJbb_arTKSk1mYCz3GWQvmeicPF_2pBzZhqIa9xsdQFo5csczvs3wPSF8o80ditIo3gyUYNl9a00xeDj9KcTie_BBx_O-vLMOiA6DYq3fMCsyobBWWmuYO6M76KixcTQVdizUo-k4VPHtE8xjr4krMNRZVIx3jM9HAX0vBtUPSsrS1-5hneHtzSWyolBhd5vc3vWt8zvAsvzvCFC2f_V091Rx6LJ5fXS8xrERv12E46N8dnxLXr4GM_bhbEkqDSIdjprlIVSyo0DJOubl_S3N9Z-bmEvmeeahiq-mmtaCRT6VWlMaxMECSBhvQyvJMbQIKZpEhl5bxRbXyUslo4Acy9KQWMQvasN8YLXmrZTmSqQBztbqJWd2kWt1k0oZOY9fEHdEiMcCJGrxjAFgbDhozfb3-e7at_w3fhnm_srTlrXWgVb5_qB0DZEqx6_btLswO_d4nUxfqVQ |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZ4HIADb8RggA_cINLWZm3KbUKgDbYJoU3sVjVLAhxoES0Xfj1O2g6B4MDViXKIE_uzbH8GOA0S4UVaRyzSQYtxpVpMaN9jRkRtKSLCpDOb0R2Ogt6E30w706opLK-r3euUpLPU82Y3Sx0SMjt-teUykh-LsExgQNi5BROvO7e_JCpBL1kYLjrTqlXm9zO-u6MvjPkjLeq8zfUmrFcwEbulXrdgQafbsFGPYMDqR27D2nBOu5rvQH5VcXenj0hiLFsgMTOYu3E3ZNmQQKotlLVbkqKwHfaYpXh_N2DWoSkMBtnDXXeEzyn2s_EFJmirzt_0U1npjvnzSzXxCx017S5Mrq_Glz1WTVVgMy9sFYxzPzCdmTCRTHQouTQqTCKKkhUF2YLii8Brk1CHlnnNGMkDjyujOQ9DSXCP-3uwlGap3geUwuK3SNm6LG50O1GC-56vOm1lZCj8BpzVlxu_luQZ8Zwm2akiJlXEThXxRwOa9f3H1UfKY4I3nFAJwaQGnNc6-Vr--7SD_20_gZXeeDiIB_3R7SGseu6J2EqzJiwVb-_6iKBHIY_dS_sEib7PGg |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1RT9swED6xIk3bA2Ns0woF7mFvYLVJ3MThrRqtgJWqmqjWtyiu7dEHkqrJXvrrd3aSwhB74NW2_OA7332nu_sO4FuYCj_WOmaxDnuMK9VjQgc-MyL2pIgJky5sRvd2El7N-M28P3_Sxe-q3ZuUZNXTYFmasrK7Uqa7bXyzNCIRs6NYey47uXkDu2SOPavpM3-wtcXkkCoATNaGi_68bpt5-Y5_XdMj3nyWInWeZ7QPezVkxEEl44-wo7MD-NCMY8D6dx7A-9stBWvxCYphzeOd_UZaxqodEnODhRt9Q1YOCbDaoll7JC1L222PeYY_p2NmnZvCcJz_mg4muMzwOr-7wBRtBfpa31dV71gsH-rpX-hoaj_DbDS8-37F6gkLbOFHvZJxHoSmvxAmlqmOJJdGRWlMEbOigFtQrBH6Hi3qyLKwGSN56HNlNOdRJAn68eALtLI8018BpbBYLla2Rosb7aVK8MAPVN9TRkYiaMNZ87jJqiLSSLaUyU4UCYkicaJINm3oNO-f1J-qSAjqcEIoBJnacN7I5HH7_7cdvu74KbydXo6S8fXkxxG8852G2KKzDrTK9R99TCiklCdO0f4Cq0TTVg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Evaluating+the+impact+of+selective+forwarding+attacks+on+RPL-based+6LoWPAN+in+IoT%3A+a+comprehensive+simulation+study&rft.jtitle=Computing&rft.date=2025-03-01&rft.pub=Springer+Nature+B.V&rft.issn=0010-485X&rft.eissn=1436-5057&rft.volume=107&rft.issue=3&rft.spage=89&rft_id=info:doi/10.1007%2Fs00607-025-01440-z&rft.externalDBID=HAS_PDF_LINK |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0010-485X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0010-485X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0010-485X&client=summon |