A survey: Attacks on RPL and 6LoWPAN in IoT
暂无分享,去创建一个
[1] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[2] Syed Obaid Amin,et al. A novel coding scheme to implement signature based IDS in IP based Sensor Networks , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management-Workshops.
[3] Utz Roedig,et al. Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[4] Kevin Weekly,et al. Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).
[5] Joel J. P. C. Rodrigues,et al. Network Admission Control Solution for 6LoWPAN Networks , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[6] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[7] Levente Buttyán,et al. VeRA - Version Number and Rank Authentication in RPL , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.
[8] Thomas C. Schmidt,et al. TRAIL: Topology Authentication in RPL , 2016, EWSN.
[9] Remi Badonnel,et al. A Study of RPL DODAG Version Attacks , 2014, AIMS.
[10] Xiaohui Liang,et al. Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.
[11] Maurizio A. Spirito,et al. Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[12] Maurizio A. Spirito,et al. DEMO: An IDS framework for internet of things empowered by 6LoWPAN , 2013, CCS.
[13] Hanno Wirtz,et al. 6LoWPAN fragmentation attacks and mitigation mechanisms , 2013, WiSec '13.
[14] Utz Roedig,et al. Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN , 2014, Secur. Commun. Networks.
[15] Taeshik Shon,et al. Wormhole attack prevention mechanism for RPL based LLN network , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).
[16] Joseph G. Tront,et al. Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid , 2014, CISR '14.
[17] Jonathan Loo,et al. The impacts of internal threats towards Routing Protocol for Low power and lossy network performance , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).
[18] Jonathan Loo,et al. The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.
[19] Jonathan Loo,et al. Specification-based IDS for securing RPL from topology attacks , 2011, 2011 IFIP Wireless Days (WD).
[20] Jonathan Loo,et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..
[21] Chen Jun,et al. Design of Complex Event-Processing IDS in Internet of Things , 2014, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.