Research Article

A Persistent Route Diversification Mechanism for Defending against Stealthy Crossfire Attack

Figure 10

Performance in defense policy generation. (a) Execution time of . (b) The average number of PRs under attack when . (c) The number of proxies of each TH when . (d) The number of total proxies when . (e) The number of THs versus the number of their proxies, . (f) The number of control messages in enforcing defense policy.
(a)
(b)
(c)
(d)
(e)
(f)