ARTICLE
|
doi:10.20944/preprints202305.0428.v1
Subject:
Computer Science And Mathematics,
Security Systems
Keywords:
Attacks-in-IoHT; Attack analysis; Malicious activities in IoHT; DoDAG attack; Blackhole attack; Rank attack; 6LoWPAN-IoT; Patient-centric IoHT; Resource-constrained IoHT; IoHT performance evaluation; RPL-based IoHT
Online: 8 May 2023 (03:17:36 CEST)