[98] ICN- Mobility management • Recording user’s identification Not mentioned Permissioned Time based model [117] • Resistant against password cracking, DoS/DDoS, Replay, Sybil, prefix hijacking, depending, and packet discarding attacks • The administrator cannot falsify the node’s reputation...
Compared with previous studies that have focused primarily on host-based vulnerabilities or isolated attack scenarios, such as jamming and satellite hijacking, this study provides a multisegment security evaluation by integrating host and protocol-layer assessments. Prior research has often lacked structured...