Security Against Rank Attack in RPL Protocol
暂无分享,去创建一个
Pascal Lorenz | Abdelhafid Abouaissa | Adda Ali-Pacha | Mohammed Amine Boudouaia | P. Lorenz | A. Abouaissa | A. Ali-Pacha
[1] Prakash Srivastava,et al. Trust-based Enhanced Secure Routing against Rank and Sybil Attacks in IoT , 2019, 2019 Twelfth International Conference on Contemporary Computing (IC3).
[2] Thomas C. Schmidt,et al. TRAIL: Topology Authentication in RPL , 2016, EWSN.
[3] Fereidoon Shams Aliee,et al. Dynamic and comprehensive trust model for IoT and its integration into RPL , 2018, The Journal of Supercomputing.
[4] Levente Buttyán,et al. VeRA - Version Number and Rank Authentication in RPL , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.
[5] Abdul Rehman,et al. Rank attack using objective function in RPL for low power and lossy networks , 2016, 2016 International Conference on Industrial Informatics and Computer Systems (CIICS).
[6] Nei Kato,et al. Harvesting and Threat Aware Security Configuration Strategy for IEEE 802.15.4 Based IoT Networks , 2019, IEEE Communications Letters.
[7] Emmanuel S. Pilli,et al. RMDD: Cross Layer Attack in Internet of Things , 2018, 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[8] Iwao Sasase,et al. Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network , 2015, 2015 21st Asia-Pacific Conference on Communications (APCC).
[9] Abbas Jamalipour,et al. Mobility-Aware Energy-Efficient Parent Selection Algorithm for Low Power and Lossy Networks , 2019, IEEE Internet of Things Journal.
[10] Abderrezak Rachedi,et al. A Secure Routing Protocol Based on RPL for Internet of Things , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[11] Behrouz Shahgholi Ghahfarokhi,et al. Sinkhole+CloneID: A hybrid attack on RPL performance and detection method , 2019, Inf. Secur. J. A Glob. Perspect..
[12] Krishna Asawa,et al. Impact analysis of rank attack with spoofed IP on routing in 6LoWPAN network , 2017, 2017 Tenth International Conference on Contemporary Computing (IC3).
[13] Jonathan Loo,et al. The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.
[14] Sayan Kumar Ray,et al. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..