Detection of rank attack in routing protocol for Low Power and Lossy Networks
暂无分享,去创建一个
Abdur Rehman | Abid Khan | Masoom Alam | Faisal Bashir | Usman Shafique | Masoom Alam | Abid Khan | Abdur Rehman | Usman Shafique | F. Bashir
[1] Levente Buttyán,et al. VeRA - Version Number and Rank Authentication in RPL , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.
[2] Pavan Pongle,et al. A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[3] Kevin Weekly,et al. Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).
[4] Wei-Kuan Shih,et al. A IoT Application of Safe Building in IPv6 Network Environment , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference.
[5] Lillian L. Dai,et al. RPL under mobility , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).
[6] Gang Feng,et al. Intrusion detection system for RPL from routing choice intrusion , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[7] Abderrezak Rachedi,et al. A Secure Routing Protocol Based on RPL for Internet of Things , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[8] Gabi Dreo Rodosek,et al. Towards a trust computing architecture for RPL in Cyber Physical Systems , 2013, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013).
[9] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[10] Anurag Agarwal,et al. The Internet of Things—A survey of topics and trends , 2014, Information Systems Frontiers.
[11] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[12] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[13] Iwao Sasase,et al. Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network , 2015 .
[15] Jonathan Loo,et al. The impacts of internal threats towards Routing Protocol for Low power and lossy network performance , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).
[16] Thomas H. Clausen,et al. A critical evaluation of the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[17] Remi Badonnel,et al. A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..
[18] Adam Dunkels,et al. Powertrace: Network-level Power Profiling for Low-power Wireless Networks , 2011 .
[19] Jonathan Loo,et al. Specification-based IDS for securing RPL from topology attacks , 2011, 2011 IFIP Wireless Days (WD).
[20] Iwao Sasase,et al. Low false alarm attackers detection in RPL by considering timing inconstancy between the rank measurements , 2015 .
[21] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[22] Sayan Kumar Ray,et al. Securing RPL routing protocol from blackhole attacks using a trust-based mechanism , 2016, 2016 26th International Telecommunication Networks and Applications Conference (ITNAC).
[23] Matthias Wahlisch,et al. Topology Authentication in RPL , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[24] V. S. Malemath,et al. Security attacks and secure routing protocols in RPL-based Internet of Things: Survey , 2017, 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI).
[25] Isabelle Chrisment,et al. A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks , 2017, IEEE Transactions on Network and Service Management.