A Root-based Defense Mechanism Against RPL Blackhole Attacks in Internet of Things Networks
暂无分享,去创建一个
[1] Daniel John Benson. A Performance Study of RPL with Trickle Algorithm Variants , 2016 .
[2] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[3] Gutierrez Jairo,et al. Securing RPL routing protocol from blackhole attacks using a trust-based mechanism , 2016 .
[4] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[5] Manuel Ricardo,et al. Energy-efficient node selection in application-driven WSN , 2017, Wirel. Networks.
[6] Siarhei Kuryla,et al. RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .
[7] Jonathan Loo,et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..
[8] James L. Antonakos,et al. Computer Networking for LANS to WANS: Hardware, Software and Security , 2009 .
[9] Hazrat Ali. A Performance Evaluation of RPL in Contiki , 2012 .
[10] Emmanuel Baccelli,et al. Applicability Statement: The Use of the Routing Protocol for Low-Power and Lossy Networks (RPL) Protocol Suite in Home Automation and Building Control , 2016, RFC.
[11] Kevin Weekly,et al. Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).
[12] Angel Lozano,et al. A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs) , 2015, RFC.
[13] Remi Badonnel,et al. A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..
[14] Hazrat Ali. A Performance Evaluation of RPL in Contiki A Cooja Simulation based study , 2012 .