17 Questions 24 Answers 0 Followers
Questions related from Faisal A. Garba
Please I would like to know how much it will cost me to buy the license for TETCOS NetSIM R & D to carry out my research on RPL attacks. Yes, I know of Contiki and Cooja. I don't want use...
10 December 2023 1,812 4 View
One of the key problems with symmetric encryption is mammoth key generation and distribution problem. How is AES encryption algorithm key exchanged between sensor nodes in Contiki in the presence...
28 August 2022 2,004 4 View
Please how can I simulate: 1. congested parent node 2. Mobile parent node and 3. Selfishness attack in RPL using Cooja simulator?
13 June 2022 5,065 0 View
If we need to provide some external storage of some kind to nodes (since they do not store anything in memory in a non storing mode of operation) in a RPL network, how can we do that? I need the...
02 June 2022 1,171 1 View
Please I need help on how to successfully implement mobile nodes in Contiki-OS 2.7 using Cooja Simulator. I chose Contiki 2.7 over Contiki-NG since the former has well documented tutorials at:...
12 February 2022 782 0 View
What is the difference between a DAG and a DODAG in RPL? Do the border router has limit to the number of nodes it can accommodate in a RPL network?
10 January 2022 9,410 3 View
Can authors be added to a manuscript that is about to be submitted that has earlier been published as a preprint? I have a research idea which I wish to preserve via preprint but the idea has not...
17 December 2021 3,982 3 View
In an RPL network, when a mobile node detach itself from it's current parent and move away in search of a new preferred parent, does it have to send a DIS message to get a new DIOs from the root...
30 November 2021 7,014 0 View
I know DIO message propagation works by following the Trickle Timer Algorithm. After receiving DIS message, does it immediately reply back or still uses the Trickle Timer Algorithm?
23 September 2021 4,469 1 View
I was going through a presentation on NS-3 network simulator and discovered that both C++ and Python were used in creating the tool. Do I need to know both Python and C++ to use the tool or...
05 July 2021 7,442 2 View
I can't see any difference between these two named attack types in OLSR routing protocol. Please help me out if there is any difference between the two.
03 June 2021 5,916 1 View
Please I am looking for a document listing technical artefacts used as evidence in digital forensics classified according to their evidential strength. Example IP address could be spoofed so it...
25 January 2021 9,268 3 View
Up to What Point/Extent do I need to Study Fuzzy Set Theory and Logic to Review and Understand Papers on Fuzzy Expert System?
05 April 2020 9,001 7 View
Please working on Mirai and Bashlite Botnet research. I am in need of the botnets attack traffic in PCAP file. Please help me.
29 December 2019 530 3 View
I need captured Mirai Botnet Traffic Dataset in pcap format for use for my research work, please help me.
14 October 2019 9,946 6 View
Please I am looking for Scopus and Web of Science peer reviewed indexed journals with fast publication, high acceptance rate and with no Article Processing Charges (APC) in the area of Internet of...
01 January 1970 1,487 1 View
Hello, please what are some research areas/topics in the field of Information Technology NOT Computer Science for PhD thesis?
01 January 1970 1,907 5 View