A Secure Routing Protocol Based on RPL for Internet of Things
暂无分享,去创建一个
[1] Kevin Weekly,et al. Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).
[2] Remi Badonnel,et al. A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..
[3] Remi Badonnel,et al. Addressing DODAG inconsistency attacks in RPL networks , 2014, 2014 Global Information Infrastructure and Networking Symposium (GIIS).
[4] Matthias Wahlisch,et al. Topology Authentication in RPL , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[5] Arjan Durresi,et al. Routing Loops in DAG-Based Low Power and Lossy Networks , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[6] Abderrezak Rachedi,et al. Advanced quality of services with security integration in wireless sensor networks , 2015, Wirel. Commun. Mob. Comput..
[7] Abderrezak Rachedi,et al. A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology , 2016, Comput. Commun..
[8] Angel Lozano,et al. A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs) , 2015, RFC.
[9] Abderrezak Rachedi,et al. muDog: Smart Monitoring Mechanism for Wireless Sensor Networks Based on IEEE 802.15.4 MAC , 2011, 2011 IEEE International Conference on Communications (ICC).
[10] Levente Buttyán,et al. VeRA - Version Number and Rank Authentication in RPL , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.
[11] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.