Evaluating the impact of selective forwarding attacks on RPL-based 6LoWPAN in IoT: a comprehensive simulation study

RPL, an IETF-developed standard routing protocol for 6LoWPAN, is susceptible to Selective Forwarding Attacks (SFA), wherein a malicious node selectively forwards certain packets while discarding others. The detrimental impacts of SFA encompass increased overhead, latency, complexity, scalability iss...

Full description

Saved in:
Bibliographic Details
Published inComputing Vol. 107; no. 3; p. 89
Main Authors Rajasekar, V. R., Rajkumar, S.
Format Journal Article
LanguageEnglish
Published Vienna Springer Vienna 01.03.2025
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN0010-485X
1436-5057
DOI10.1007/s00607-025-01440-z

Cover

Abstract RPL, an IETF-developed standard routing protocol for 6LoWPAN, is susceptible to Selective Forwarding Attacks (SFA), wherein a malicious node selectively forwards certain packets while discarding others. The detrimental impacts of SFA encompass increased overhead, latency, complexity, scalability issues, security risks, resource consumption, and compatibility challenges. A thorough analysis of the influence of SFA on RPL-based 6LoWPAN networks across various dimensions is essential for the research community to devise optimal solutions. In this work, we examined the adverse effects of SFA on RPL-based 6LoWPAN using a simulation-based experimental study, with six scenarios with 10%, 20%, 30%, and 50% of attacker nodes to investigate the detrimental impacts of SFA on control traffic overhead, duty cycling, latency, expected transmission rate, network convergence time, packet delivery rate, network overload, power consumption, and throughput. Our study shows that the CTO has climbed from 4.41 to 37.94%, resulting in negative network bandwidth usage. Rx and Tx duty cycles grew by 1670.71% and 341.66% across all the scenarios with attacker nodes, respectively. Latency increased by 111.58% and 108.27%, respectively, when selectively dropping control and data packets, and a maximum of 20.04% for both (control and data) packet dropping. The ETX is increased between 1.31 and 14.9% and remains the same as in the reference topology in the case of only data packet drop, indicating that the RPL’s self-healing mechanism does not affect data packet loss. In all scenarios, network convergence time increased by 46%, PDR decreased by 14.63%, network load increased by 8.14%, and the average energy consumed increased by 18.85% on average. This study further revealed that nodes positioned beyond the radio range of the sink node, which was not selected as the preferred parent, exhibited reduced energy consumption. The increase in attackers increases network throughput by 43.98% to transmit only control packets. As far as our knowledge extends, this pioneering research study thoroughly investigates the influence of RPL-specific SFA on 6LoWPAN networks across multiple dimensions, including variations in packet drop types (Data/Control), attacker deployment locations, and varying attacker quantities.
AbstractList RPL, an IETF-developed standard routing protocol for 6LoWPAN, is susceptible to Selective Forwarding Attacks (SFA), wherein a malicious node selectively forwards certain packets while discarding others. The detrimental impacts of SFA encompass increased overhead, latency, complexity, scalability issues, security risks, resource consumption, and compatibility challenges. A thorough analysis of the influence of SFA on RPL-based 6LoWPAN networks across various dimensions is essential for the research community to devise optimal solutions. In this work, we examined the adverse effects of SFA on RPL-based 6LoWPAN using a simulation-based experimental study, with six scenarios with 10%, 20%, 30%, and 50% of attacker nodes to investigate the detrimental impacts of SFA on control traffic overhead, duty cycling, latency, expected transmission rate, network convergence time, packet delivery rate, network overload, power consumption, and throughput. Our study shows that the CTO has climbed from 4.41 to 37.94%, resulting in negative network bandwidth usage. Rx and Tx duty cycles grew by 1670.71% and 341.66% across all the scenarios with attacker nodes, respectively. Latency increased by 111.58% and 108.27%, respectively, when selectively dropping control and data packets, and a maximum of 20.04% for both (control and data) packet dropping. The ETX is increased between 1.31 and 14.9% and remains the same as in the reference topology in the case of only data packet drop, indicating that the RPL’s self-healing mechanism does not affect data packet loss. In all scenarios, network convergence time increased by 46%, PDR decreased by 14.63%, network load increased by 8.14%, and the average energy consumed increased by 18.85% on average. This study further revealed that nodes positioned beyond the radio range of the sink node, which was not selected as the preferred parent, exhibited reduced energy consumption. The increase in attackers increases network throughput by 43.98% to transmit only control packets. As far as our knowledge extends, this pioneering research study thoroughly investigates the influence of RPL-specific SFA on 6LoWPAN networks across multiple dimensions, including variations in packet drop types (Data/Control), attacker deployment locations, and varying attacker quantities.
ArticleNumber 89
Author Rajkumar, S.
Rajasekar, V. R.
Author_xml – sequence: 1
  givenname: V. R.
  surname: Rajasekar
  fullname: Rajasekar, V. R.
  organization: School of Computer Science and Engineering, Vellore Institute of Technology
– sequence: 2
  givenname: S.
  surname: Rajkumar
  fullname: Rajkumar, S.
  email: rajkumars@vit.ac.in
  organization: School of Computer Science and Engineering, Vellore Institute of Technology
BookMark eNp9kNFKwzAUhoNMcJu-gFcBr6MnbdK03o0xdVBUZKJ3IW2TrXNrZpJOtqe3c4J3Xh04_N9_Dt8A9RrbaIQuKVxTAHHjARIQBCJOgDIGZH-C-pTFCeHARQ_1ASgQlvL3MzTwfgkAUZxmfeQnW7VqVaibOQ4Ljev1RpUBW4O9Xuky1FuNjXVfylWHiApBlR8e2wa_POekUF5XOMnt2_PoEdcNntrZLVa4tOuN0wvd-APv63W76k50kA9ttTtHp0atvL74nUP0ejeZjR9I_nQ_HY9yUkYCAmHd-4aXqckKpUXBClMJlbEkq3QRpTwTSUS7pRYs4bExBUsiVhnNmBAFpxmLh-jq2Ltx9rPVPsilbV3TnZQxFSyinKeHVHRMlc5677SRG1evldtJCvIgVx7lyk6u_JEr9x0UHyHfhZu5dn_V_1DfDCZ_uA
Cites_doi 10.17487/rfc4919
10.1155/2017/9324035
10.1145/3494524
10.1109/I2CT.2018.8529426
10.1016/j.adhoc.2012.02.016
10.1007/S42979-023-01799-W/METRICS
10.1109/WF-IOT.2018.8355171
10.3390/S16010118
10.1109/CSNDSP49049.2020.9249519
10.1109/AINA.2017.161
10.1007/S13369-022-07342-Y/METRICS
10.1007/978-981-15-0135-7_7
10.1007/S11277-018-5778-2
10.1109/ICCI51257.2020.9247818
10.1109/NCA.2017.8171360
10.5815/IJCNIS.2020.04.02
10.4018/IJSWIS.2017070102
10.17487/rfc6550
10.1186/S13174-019-0117-8
10.18080/ajtde.v5n1.2
10.1088/1742-6596/1142/1/012009
10.1109/ATNAC.2016.7878793
10.48550/arxiv.2201.06937
10.12968/prtu.2014.1.39.49
10.5626/KTCP.2020.26.1.20
10.1007/S11227-018-2700-3
10.1109/IWCMC.2017.7986299
10.1109/GLOCOM.2016.7841543
10.1109/I2CT45611.2019.9033926
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer-Verlag GmbH Austria, part of Springer Nature 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
Copyright Springer Nature B.V. Mar 2025
Copyright_xml – notice: The Author(s), under exclusive licence to Springer-Verlag GmbH Austria, part of Springer Nature 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
– notice: Copyright Springer Nature B.V. Mar 2025
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1007/s00607-025-01440-z
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
DeliveryMethod fulltext_linktorsrc
Discipline Mathematics
Computer Science
EISSN 1436-5057
ExternalDocumentID 10_1007_s00607_025_01440_z
GroupedDBID -Y2
-~C
-~X
.4S
.86
.DC
.VR
06D
0R~
0VY
1N0
1SB
2.D
203
28-
29F
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5GY
5QI
5VS
67Z
6NX
6TJ
78A
7WY
8AO
8FE
8FG
8FL
8G5
8TC
8UJ
8VB
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AAPKM
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDBE
ABDBF
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACUHS
ACZOJ
ADHHG
ADHIR
ADHKG
ADIMF
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMOZ
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFFNX
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHQJS
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
AKVCP
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYFIA
AYJHY
AZFZN
AZQEC
B-.
B0M
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BKOMP
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DWQXO
EAD
EAP
EBA
EBLON
EBR
EBS
EBU
ECS
EDO
EIOEI
EJD
EMK
EPL
ESBYG
EST
ESX
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ7
GQ8
GUQSH
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K1G
K60
K6V
K6~
K7-
KDC
KOV
KOW
LAS
LLZTM
M0C
M2O
M4Y
MA-
MK~
ML~
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
P19
P2P
P62
P9O
PF0
PHGZT
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
QWB
R4E
R89
R9I
RHV
RIG
RNI
RNS
ROL
RPX
RSV
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TH9
TN5
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
ZL0
ZMTXR
~8M
~EX
AAYXX
ABBRH
ABFSG
ACSTC
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
AMVHM
ATHPR
CITATION
PHGZM
7SC
8FD
ABRTQ
AFKWF
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c270t-4436f5c8f9bae7b4bfd7a9469deb285976214bfe74653ffb4624dfe4477b51943
IEDL.DBID AGYKE
ISSN 0010-485X
IngestDate Sat Aug 16 19:51:10 EDT 2025
Tue Jul 01 05:14:33 EDT 2025
Wed Mar 26 01:23:23 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords 97-11
IPv6
Selective Forwarding attack
6LoWPAN
IoT
RPL
LLN
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c270t-4436f5c8f9bae7b4bfd7a9469deb285976214bfe74653ffb4624dfe4477b51943
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 3174215584
PQPubID 48322
ParticipantIDs proquest_journals_3174215584
crossref_primary_10_1007_s00607_025_01440_z
springer_journals_10_1007_s00607_025_01440_z
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20250300
2025-03-00
20250301
PublicationDateYYYYMMDD 2025-03-01
PublicationDate_xml – month: 3
  year: 2025
  text: 20250300
PublicationDecade 2020
PublicationPlace Vienna
PublicationPlace_xml – name: Vienna
– name: Wien
PublicationTitle Computing
PublicationTitleAbbrev Computing
PublicationYear 2025
Publisher Springer Vienna
Springer Nature B.V
Publisher_xml – name: Springer Vienna
– name: Springer Nature B.V
References AO Bang (1440_CR15) 2022; 55
1440_CR27
T Sakthivel (1440_CR9) 2018; 101
1440_CR24
1440_CR25
1440_CR20
1440_CR22
D Airehrour (1440_CR21) 2017; 5
A Bang (1440_CR16) 2023; 48
F Gara (1440_CR26) 2017; 13
MR Abdmeziem (1440_CR6) 2016
D Miorandi (1440_CR7) 2012; 10
1440_CR8
SOM Kamel (1440_CR29) 2020; 12
1440_CR1
1440_CR17
1440_CR2
A Mathur (1440_CR4) 2016; 16
1440_CR18
SM Muzammal (1440_CR19) 2020; 2020
V Neerugatti (1440_CR28) 2020; 1054
1440_CR12
1440_CR3
S Suhail (1440_CR10) 2020; 26
1440_CR14
1440_CR31
SY Hashemi (1440_CR33) 2018; 75
1440_CR30
P Sethi (1440_CR5) 2017; 1
1440_CR11
1440_CR32
R Stephen (1440_CR34) 2018; 1142
A Bang (1440_CR13) 2023; 4
AL Santos (1440_CR23) 2019; 10
References_xml – ident: 1440_CR3
  doi: 10.17487/rfc4919
– volume: 1
  start-page: 25
  year: 2017
  ident: 1440_CR5
  publication-title: J Elect Comput Eng
  doi: 10.1155/2017/9324035
– volume: 55
  start-page: 1
  issue: 2
  year: 2022
  ident: 1440_CR15
  publication-title: ACM Comput Surv
  doi: 10.1145/3494524
– ident: 1440_CR20
  doi: 10.1109/I2CT.2018.8529426
– volume: 10
  start-page: 1497
  issue: 7
  year: 2012
  ident: 1440_CR7
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2012.02.016
– volume: 4
  start-page: 1
  issue: 4
  year: 2023
  ident: 1440_CR13
  publication-title: SN Comput Sci
  doi: 10.1007/S42979-023-01799-W/METRICS
– ident: 1440_CR32
  doi: 10.1109/WF-IOT.2018.8355171
– volume: 16
  start-page: 118
  issue: 1
  year: 2016
  ident: 1440_CR4
  publication-title: Sensors
  doi: 10.3390/S16010118
– volume-title: Studies in Systems Decision and Control
  year: 2016
  ident: 1440_CR6
– ident: 1440_CR22
  doi: 10.1109/CSNDSP49049.2020.9249519
– ident: 1440_CR24
  doi: 10.1109/AINA.2017.161
– volume: 48
  start-page: 2489
  issue: 2
  year: 2023
  ident: 1440_CR16
  publication-title: Arab J Sci Eng
  doi: 10.1007/S13369-022-07342-Y/METRICS
– volume: 1054
  start-page: 67
  year: 2020
  ident: 1440_CR28
  publication-title: Adv Intell Syst Comput
  doi: 10.1007/978-981-15-0135-7_7
– ident: 1440_CR30
– volume: 101
  start-page: 1581
  issue: 3
  year: 2018
  ident: 1440_CR9
  publication-title: Wirel Pers Commun
  doi: 10.1007/S11277-018-5778-2
– volume: 2020
  start-page: 305
  year: 2020
  ident: 1440_CR19
  publication-title: Conf Comput Intell ICCI
  doi: 10.1109/ICCI51257.2020.9247818
– ident: 1440_CR17
– ident: 1440_CR25
  doi: 10.1109/NCA.2017.8171360
– volume: 12
  start-page: 11
  issue: 4
  year: 2020
  ident: 1440_CR29
  publication-title: Int J Comput Netw Inf Secur
  doi: 10.5815/IJCNIS.2020.04.02
– ident: 1440_CR11
– volume: 13
  start-page: 22
  issue: 3
  year: 2017
  ident: 1440_CR26
  publication-title: Int J Semant Web Inf Syst
  doi: 10.4018/IJSWIS.2017070102
– ident: 1440_CR1
  doi: 10.17487/rfc6550
– volume: 10
  start-page: 1
  issue: 1
  year: 2019
  ident: 1440_CR23
  publication-title: J. Internet Serv. Appl.
  doi: 10.1186/S13174-019-0117-8
– volume: 5
  start-page: 50
  issue: 1
  year: 2017
  ident: 1440_CR21
  publication-title: Aust J Telecommun Digit Econ
  doi: 10.18080/ajtde.v5n1.2
– ident: 1440_CR2
– volume: 1142
  start-page: 12009
  issue: 1
  year: 2018
  ident: 1440_CR34
  publication-title: J Phys Conf Ser
  doi: 10.1088/1742-6596/1142/1/012009
– ident: 1440_CR31
  doi: 10.1109/ATNAC.2016.7878793
– ident: 1440_CR18
  doi: 10.48550/arxiv.2201.06937
– ident: 1440_CR8
  doi: 10.12968/prtu.2014.1.39.49
– volume: 26
  start-page: 20
  issue: 1
  year: 2020
  ident: 1440_CR10
  publication-title: J Inf Sci Computing Pract.
  doi: 10.5626/KTCP.2020.26.1.20
– volume: 75
  start-page: 3555
  issue: 7
  year: 2018
  ident: 1440_CR33
  publication-title: J Supercomput
  doi: 10.1007/S11227-018-2700-3
– ident: 1440_CR14
  doi: 10.1109/IWCMC.2017.7986299
– ident: 1440_CR12
  doi: 10.1109/GLOCOM.2016.7841543
– ident: 1440_CR27
  doi: 10.1109/I2CT45611.2019.9033926
SSID ssj0002389
Score 2.37255
Snippet RPL, an IETF-developed standard routing protocol for 6LoWPAN, is susceptible to Selective Forwarding Attacks (SFA), wherein a malicious node selectively...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Index Database
Publisher
StartPage 89
SubjectTerms Artificial Intelligence
Computer Appl. in Administrative Data Processing
Computer Communication Networks
Computer Science
Convergence
Energy consumption
Information Systems Applications (incl.Internet)
Network latency
Nodes
Packet transmission
Radio range
Regular Paper
Software Engineering
Topology
Transmission rate (communications)
Title Evaluating the impact of selective forwarding attacks on RPL-based 6LoWPAN in IoT: a comprehensive simulation study
URI https://link.springer.com/article/10.1007/s00607-025-01440-z
https://www.proquest.com/docview/3174215584
Volume 107
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED1BWWDgG1Eo6AY2MGoSJ7HZKtTyjRCiokxRXNuAEAkiYemvx06cIhAMrIllJT777ln37h3AXpQynyvFCVdRl1Apu4SpwCeacU8wbjDp2GZ0r66j0yE9H4UjVxRWNGz3JiVZeeppsZuVDomJbb_arTKSk1mYCz3GWQvmeicPF_2pBzZhqIa9xsdQFo5csczvs3wPSF8o80ditIo3gyUYNl9a00xeDj9KcTie_BBx_O-vLMOiA6DYq3fMCsyobBWWmuYO6M76KixcTQVdizUo-k4VPHtE8xjr4krMNRZVIx3jM9HAX0vBtUPSsrS1-5hneHtzSWyolBhd5vc3vWt8zvAsvzvCFC2f_V091Rx6LJ5fXS8xrERv12E46N8dnxLXr4GM_bhbEkqDSIdjprlIVSyo0DJOubl_S3N9Z-bmEvmeeahiq-mmtaCRT6VWlMaxMECSBhvQyvJMbQIKZpEhl5bxRbXyUslo4Acy9KQWMQvasN8YLXmrZTmSqQBztbqJWd2kWt1k0oZOY9fEHdEiMcCJGrxjAFgbDhozfb3-e7at_w3fhnm_srTlrXWgVb5_qB0DZEqx6_btLswO_d4nUxfqVQ
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZ4HIADb8RggA_cINLWZm3KbUKgDbYJoU3sVjVLAhxoES0Xfj1O2g6B4MDViXKIE_uzbH8GOA0S4UVaRyzSQYtxpVpMaN9jRkRtKSLCpDOb0R2Ogt6E30w706opLK-r3euUpLPU82Y3Sx0SMjt-teUykh-LsExgQNi5BROvO7e_JCpBL1kYLjrTqlXm9zO-u6MvjPkjLeq8zfUmrFcwEbulXrdgQafbsFGPYMDqR27D2nBOu5rvQH5VcXenj0hiLFsgMTOYu3E3ZNmQQKotlLVbkqKwHfaYpXh_N2DWoSkMBtnDXXeEzyn2s_EFJmirzt_0U1npjvnzSzXxCx017S5Mrq_Glz1WTVVgMy9sFYxzPzCdmTCRTHQouTQqTCKKkhUF2YLii8Brk1CHlnnNGMkDjyujOQ9DSXCP-3uwlGap3geUwuK3SNm6LG50O1GC-56vOm1lZCj8BpzVlxu_luQZ8Zwm2akiJlXEThXxRwOa9f3H1UfKY4I3nFAJwaQGnNc6-Vr--7SD_20_gZXeeDiIB_3R7SGseu6J2EqzJiwVb-_6iKBHIY_dS_sEib7PGg
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1RT9swED6xIk3bA2Ns0woF7mFvYLVJ3MThrRqtgJWqmqjWtyiu7dEHkqrJXvrrd3aSwhB74NW2_OA7332nu_sO4FuYCj_WOmaxDnuMK9VjQgc-MyL2pIgJky5sRvd2El7N-M28P3_Sxe-q3ZuUZNXTYFmasrK7Uqa7bXyzNCIRs6NYey47uXkDu2SOPavpM3-wtcXkkCoATNaGi_68bpt5-Y5_XdMj3nyWInWeZ7QPezVkxEEl44-wo7MD-NCMY8D6dx7A-9stBWvxCYphzeOd_UZaxqodEnODhRt9Q1YOCbDaoll7JC1L222PeYY_p2NmnZvCcJz_mg4muMzwOr-7wBRtBfpa31dV71gsH-rpX-hoaj_DbDS8-37F6gkLbOFHvZJxHoSmvxAmlqmOJJdGRWlMEbOigFtQrBH6Hi3qyLKwGSN56HNlNOdRJAn68eALtLI8018BpbBYLla2Rosb7aVK8MAPVN9TRkYiaMNZ87jJqiLSSLaUyU4UCYkicaJINm3oNO-f1J-qSAjqcEIoBJnacN7I5HH7_7cdvu74KbydXo6S8fXkxxG8852G2KKzDrTK9R99TCiklCdO0f4Cq0TTVg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Evaluating+the+impact+of+selective+forwarding+attacks+on+RPL-based+6LoWPAN+in+IoT%3A+a+comprehensive+simulation+study&rft.jtitle=Computing&rft.date=2025-03-01&rft.pub=Springer+Nature+B.V&rft.issn=0010-485X&rft.eissn=1436-5057&rft.volume=107&rft.issue=3&rft.spage=89&rft_id=info:doi/10.1007%2Fs00607-025-01440-z&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0010-485X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0010-485X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0010-485X&client=summon