Hi Yatch,
Thanks for your comments!
The attack as such abstracts away from the specific approach that the
adversary adopts to previously acquire node addresses. This can possibly
rely, for example, on traffic analysis to correlate with physical
position and observable events/outcomes triggered
Hi Marco,
I'd like to ask you to help me understand the attack (>_<)
https://tools.ietf.org/html/draft-tiloca-6tisch-robust-scheduling-01#section-3.2
> 3.2. Attack Example
>
> (snip)
>
>2. The adversary picks a channel 'f*' at random, and monitors it for
>N_C consecutive
Hi all,
We have just submitted a new version of our draft describing how to
alter the communication pattern of network nodes to counteract selective
jamming.
https://tools.ietf.org/html/draft-tiloca-6tisch-robust-scheduling-01
This update especially addresses the comments from IETF 103, by