LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks
暂无分享,去创建一个
Mauro Conti | Wafa Ben Jaballah | Pallavi Kaliyar | Chhagan Lal | M. Conti | Chhagan Lal | Pallavi Kaliyar
[1] Ahmad-Reza Sadeghi,et al. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[2] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[3] Xiaohui Liang,et al. Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.
[4] Hon Sun Chiu,et al. Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .
[5] Ahmad-Reza Sadeghi,et al. Revisiting Context-Based Authentication in IoT , 2018, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[6] Ruchi Mehta,et al. Trust based mechanism for Securing IoT Routing Protocol RPL against Wormhole &Grayhole Attacks , 2018, 2018 3rd International Conference for Convergence in Technology (I2CT).
[7] Jonathan Loo,et al. The impacts of internal threats towards Routing Protocol for Low power and lossy network performance , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).
[8] Ivana Tomić,et al. A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.
[9] Mohsen Guizani,et al. A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.
[10] Abderrezak Rachedi,et al. A Secure Routing Protocol Based on RPL for Internet of Things , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[11] Majid Khabbazian,et al. Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks , 2009, IEEE Transactions on Wireless Communications.
[12] Michele Nogueira Lima,et al. Evaluation of Sybil attack detection approaches in the Internet of Things content dissemination , 2016, 2016 Wireless Days (WD).
[13] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[14] Andrew H. Kemp,et al. RPL-Based Routing Protocols in IoT Applications: A Review , 2019, IEEE Sensors Journal.
[15] Pavan Pongle,et al. A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[16] Preetha Thulasiraman,et al. A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[17] Sayan Kumar Ray,et al. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..
[18] Muhammad Nasir Mumtaz Bhutta,et al. Wormhole attack detection in routing protocol for low power lossy networks , 2017, 2017 International Conference on Information and Communication Technologies (ICICT).
[19] Cong Pu,et al. Mitigating Forwarding misbehaviors in RPL-based low power and lossy networks , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[20] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[21] Pavan Pongle,et al. Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .
[22] Imed Romdhani,et al. Addressing the DAO Insider Attack in RPL’s Internet of Things Networks , 2019, IEEE Communications Letters.
[23] Gianluca Dini,et al. Implementation of a wormhole attack against a rpl network: Challenges and effects , 2018, 2018 14th Annual Conference on Wireless On-demand Network Systems and Services (WONS).
[24] Shahid Raza,et al. TinyIKE: Lightweight IKEv2 for Internet of Things , 2019, IEEE Internet of Things Journal.
[25] Virender Ranga,et al. ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things , 2019, 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU).
[26] Shusen Yang,et al. BRPL: Backpressure RPL for High-Throughput and Mobile IoTs , 2017, IEEE Transactions on Mobile Computing.
[27] Mauro Conti,et al. SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things , 2018, 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[28] David E. Culler,et al. Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey , 2017, IEEE Communications Surveys & Tutorials.
[29] Chung-Horng Lung,et al. Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.
[30] G. Geethakumari,et al. Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).