Using Provenance to Detect Selective Forwarding Attack in RPL-Based Internet of Things
暂无分享,去创建一个
[1] Adeel Anjum,et al. Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes , 2017, J. Netw. Comput. Appl..
[2] Keke Gai,et al. Security and Privacy Issues in Internet of Things , 2019, Blockchain Technology in Internet of Things.
[3] Choong Seon Hong,et al. Data trustworthiness in IoT , 2018, 2018 International Conference on Information Networking (ICOIN).
[4] Mrs. K. Valarmathi,et al. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks , 2016 .
[5] Sabah Suhail,et al. Introducing Secure Provenance in IoT: Requirements and Challenges , 2016, 2016 International Workshop on Secure Internet of Things (SIoT).
[6] Elisa Bertino,et al. Dictionary Based Secure Provenance Compression for Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.
[7] Adam Dunkels,et al. Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[8] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[9] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[10] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[11] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.