A Trust Based Mechanism to Combat Blackhole Attack in RPL Protocol
暂无分享,去创建一个
[1] Gabi Dreo Rodosek,et al. Towards a trust computing architecture for RPL in Cyber Physical Systems , 2013, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013).
[2] Dominique Barthel,et al. Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks , 2012, RFC.
[3] N. Bhalaji,et al. Performance analysis of IoT protocol under different mobility models , 2018, Comput. Electr. Eng..
[4] N. Bhalaji,et al. Trust Based Strategy to Resist Collaborative Blackhole Attack in Manet , 2010, BAIP.
[5] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[6] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[7] Ivana Tomić,et al. A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.
[8] Hazrat Ali. A Performance Evaluation of RPL in Contiki , 2012 .
[9] Kevin Weekly,et al. Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).