Abstract
The secured routing protocol expresses an underlying elementary unit confide in information interchanging system. Miserably, presently no anatomy remains to supports in the layout and inquiry of secured routing protocols. This work investigates the structured approaches of secured routing and the interrelating attacker standards to contribute a structure for modeling prime protocols. Based on this anatomy, it is detected that the powerful attacks are targeting the data in the control plane. In this paper the strength of attackers are classified with respect to the locations under its direct control.
Publisher
Science Publishing Corporation
Subject
Hardware and Architecture,General Engineering,General Chemical Engineering,Environmental Engineering,Computer Science (miscellaneous),Biotechnology
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A low-power consumption security data fusion model for Industrial Internet of Things;International Journal of Computers and Applications;2024-09-13
2. Feature Extraction to Evaluate the Quality of Data Using Machine Learning Technique;2024 Third International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE);2024-04-26
3. Analysing the Quality and Management of Data in Big Data;2024 Third International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE);2024-04-26
4. Fake News Detection Through Feature Weight Optimized Lasso Regression (FWO-LAR);2024 International Conference on Expert Clouds and Applications (ICOECA);2024-04-18