A Detailed Classification of Routing Attacks Against RPL in Internet of Things
暂无分享,去创建一个
[1] Jean-Philippe Vasseur,et al. The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams , 2010, RFC.
[2] Kevin Weekly,et al. Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).
[3] Matthias Wahlisch,et al. Topology Authentication in RPL , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[4] Mohammed Bouhorma,et al. Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions , 2014 .
[5] Taeshik Shon,et al. Wormhole attack prevention mechanism for RPL based LLN network , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).
[6] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[7] Maurizio A. Spirito,et al. Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[8] Jonathan Loo,et al. The impacts of internal threats towards Routing Protocol for Low power and lossy network performance , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).
[9] Remi Badonnel,et al. Addressing DODAG inconsistency attacks in RPL networks , 2014, 2014 Global Information Infrastructure and Networking Symposium (GIIS).
[10] Jonathan Loo,et al. The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.
[11] Pavan Pongle,et al. A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[12] Jonathan Loo,et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..
[13] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[14] Arjan Durresi,et al. Routing Loops in DAG-Based Low Power and Lossy Networks , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[15] Jp Vasseur. Overview of Existing Routing Protocols for Low Power and Lossy Networks , 2007 .
[16] Remi Badonnel,et al. A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..
[17] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[18] Cengis Hasan,et al. 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) , 2013 .
[19] Levente Buttyán,et al. VeRA - Version Number and Rank Authentication in RPL , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.
[20] Remi Badonnel,et al. A Study of RPL DODAG Version Attacks , 2014, AIMS.