Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks
暂无分享,去创建一个
[1] Remi Badonnel,et al. Detecting version number attacks in RPL-based networks using a distributed monitoring architecture , 2016, 2016 12th International Conference on Network and Service Management (CNSM).
[2] Remi Badonnel,et al. Using the RPL protocol for supporting passive monitoring in the Internet of Things , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[3] Remi Badonnel,et al. A Study of RPL DODAG Version Attacks , 2014, AIMS.
[4] Siarhei Kuryla,et al. RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .
[5] Imed Romdhani,et al. Addressing the DAO Insider Attack in RPL’s Internet of Things Networks , 2019, IEEE Communications Letters.
[6] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[7] David E. Culler,et al. Extending IP to Low-Power, Wireless Personal Area Networks , 2008, IEEE Internet Computing.
[8] Abhishek Verma,et al. Mitigation of DIS flooding attacks in RPL‐based 6LoWPAN networks , 2019, Trans. Emerg. Telecommun. Technol..
[9] Chung-Horng Lung,et al. Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.
[10] Mansour Sheikhan,et al. Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..
[11] Gianluca Dini,et al. An Implementation and Evaluation of the Security Features of RPL , 2017, ADHOC-NOW.
[12] Virender Ranga,et al. Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT , 2019, Wireless Personal Communications.
[13] Preetha Thulasiraman,et al. A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[14] Sayan Kumar Ray,et al. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..
[15] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[16] Hai Anh TRAN,et al. The Flooding Attack in Low Power and Lossy Networks: A Case Study , 2018, 2018 International Conference on Smart Communications in Network Technologies (SaCoNeT).
[17] Isabelle Chrisment,et al. A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks , 2017, IEEE Transactions on Network and Service Management.
[18] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[19] Jonathan Loo,et al. The impacts of internal threats towards Routing Protocol for Low power and lossy network performance , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).
[20] Angel Lozano,et al. A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs) , 2015, RFC.
[21] Jonathan Loo,et al. A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology , 2016, Inf..
[22] Virender Ranga,et al. ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things , 2019, 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU).
[23] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.