Research Article
A Persistent Route Diversification Mechanism for Defending against Stealthy Crossfire Attack
Figure 10
Performance in defense policy generation. (a) Execution time of . (b) The average number of PRs under attack when . (c) The number of proxies of each TH when . (d) The number of total proxies when . (e) The number of THs versus the number of their proxies, . (f) The number of control messages in enforcing defense policy.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |