Digital Signature Based Countermeasure Against Puppet Attack in the Internet of Things
暂无分享,去创建一个
[1] Cong Pu. Spam DIS Attack Against Routing Protocol in the Internet of Things , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).
[2] Cong Pu,et al. Jamming-Resilient Multipath Routing Protocol for Flying Ad Hoc Networks , 2018, IEEE Access.
[3] Cong Pu,et al. Mitigating Suppression Attack in Multicast Protocol for Low Power and Lossy Networks , 2018, 2018 IEEE 43rd Conference on Local Computer Networks (LCN).
[4] Sema F. Oktug,et al. New lightweight mitigation techniques for RPL version number attacks , 2019, Ad Hoc Networks.
[5] Angel Lozano,et al. A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs) , 2015, RFC.
[6] Preetha Thulasiraman,et al. A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[7] Cong Pu,et al. Energy Depletion Attack in Low Power and Lossy Networks: Analysis and Defenses , 2019, 2019 2nd International Conference on Data Intelligence and Security (ICDIS).
[8] Siarhei Kuryla,et al. RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .
[9] Cong Pu,et al. Mitigating stealthy collision attack in energy harvesting motivated networks , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).
[10] Cong Pu,et al. Hatchetman Attack: A Denial of Service Attack Against Routing in Low Power and Lossy Networks , 2018, 2018 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2018 4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom).
[11] Imed Romdhani,et al. Addressing the DAO Insider Attack in RPL’s Internet of Things Networks , 2019, IEEE Communications Letters.
[12] Cong Pu,et al. Spy vs. spy: Camouflage-based active detection in energy harvesting motivated networks , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[13] Cong Pu,et al. A Light-Weight Countermeasure to Forwarding Misbehavior in Wireless Sensor Networks: Design, Analysis, and Evaluation , 2018, IEEE Systems Journal.
[14] Cong Pu. Energy Depletion Attack Against Routing Protocol in the Internet of Things , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[15] Cong Pu. Mitigating DAO inconsistency attack in RPL-based low power and lossy networks , 2018, 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC).
[16] Cong Pu,et al. Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses , 2018, Sensors.
[17] Cong Pu,et al. Self-Adjusting Share-Based Countermeasure to Interest Flooding Attack in Named Data Networking , 2019, 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[18] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[19] Cong Pu,et al. Mitigating Forwarding misbehaviors in RPL-based low power and lossy networks , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[20] Cong Pu,et al. EYES: Mitigating forwarding misbehavior in energy harvesting motivated networks , 2018, Comput. Commun..
[21] Cong Pu,et al. Active detection in mitigating routing misbehavior for MANETs , 2019, Wirel. Networks.