Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP
暂无分享,去创建一个
[1] Levente Buttyán,et al. VeRA - Version Number and Rank Authentication in RPL , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.
[2] Andrew H. Kemp,et al. RPL-Based Routing Protocols in IoT Applications: A Review , 2019, IEEE Sensors Journal.
[3] Abdur Rehman,et al. Detection of rank attack in routing protocol for Low Power and Lossy Networks , 2018, Ann. des Télécommunications.
[4] Jonathan Loo,et al. Specification-based IDS for securing RPL from topology attacks , 2011, 2011 IFIP Wireless Days (WD).
[5] Emmanuel Nataf,et al. Survey on RPL enhancements: A focus on topology, security and mobility , 2018, Comput. Commun..
[6] Anant V. Nimkar,et al. A comparative study on RPL attacks and security solutions , 2017, 2017 International Conference on Intelligent Computing and Control (I2C2).
[7] Thomas C. Schmidt,et al. TRAIL: Topology Authentication in RPL , 2016, EWSN.
[8] V.K.Karthik,et al. Addressing Attacks and Security Mechanism in the RPL based IOT , 2017 .
[9] Sema F. Oktug,et al. RPL version number attacks: In-depth study , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[10] Iwao Sasase,et al. Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network , 2015, 2015 21st Asia-Pacific Conference on Communications (APCC).
[11] Virender Ranga,et al. Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review , 2020, IEEE Sensors Journal.
[12] Prakash Srivastava,et al. Trust-based Enhanced Secure Routing against Rank and Sybil Attacks in IoT , 2019, 2019 Twelfth International Conference on Contemporary Computing (IC3).
[13] N. Z. Jhanjhi,et al. Proposing a Secure RPL based Internet of Things Routing Protocol: A Review , 2020, Ad Hoc Networks.
[14] Abbas Jamalipour,et al. A Lightweight Intrusion Detection for Sybil Attack Under Mobile RPL in the Internet of Things , 2020, IEEE Internet of Things Journal.
[15] Sneha A. Dalvi,et al. Internet of Things for Smart Cities , 2017 .
[16] Sema F. Oktug,et al. New lightweight mitigation techniques for RPL version number attacks , 2019, Ad Hoc Networks.
[17] Young-Bae Ko,et al. A Distributed and Cooperative Verification Mechanism to Defend against DODAG Version Number Attack in RPL , 2016, PECCS.
[18] Hiren Patel,et al. A Survey on Trust-based Intrusion Detection for Version Number Attack on RPL , 2018 .
[19] Sayan Kumar Ray,et al. Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..
[20] Noor Zaman,et al. A review on smart home present state and challenges: linked to context-awareness internet of things (IoT) , 2019, Wirel. Networks.
[21] Noor Zaman,et al. Proposing A Data Privacy Aware Protocol for Roadside Accident Video Reporting Service Using 5G In Vehicular Cloud Networks Environment , 2018, 2018 4th International Conference on Computer and Information Sciences (ICCOINS).
[22] Jonathan Loo,et al. The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.
[23] Sajjad Mahmood,et al. Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study , 2020, Arabian Journal for Science and Engineering.
[24] Isabelle Chrisment,et al. A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks , 2017, IEEE Transactions on Network and Service Management.
[25] Murad Khan,et al. Internet of Things: A Comprehensive Review of Enabling Technologies, Architecture, and Challenges , 2018 .
[26] Noor Zaman,et al. A Lightweight and Secure Authentication Scheme for IoT Based E-Health Applications , 2019 .
[27] Preetha Thulasiraman,et al. A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[28] Sayan Kumar Ray,et al. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..
[29] Xing Li,et al. A Security Routing Protocol for Internet of Things Based on RPL , 2017, 2017 International Conference on Networking and Network Applications (NaNA).
[30] Nz Jhanjhi,et al. Comprehensive Review: Privacy Protection of User in Location-Aware Services of Mobile Cloud Computing , 2019, Wirel. Pers. Commun..
[31] Mehdi Hosseinzadeh,et al. A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy Networks , 2018, Wirel. Pers. Commun..
[32] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[33] Chung-Horng Lung,et al. Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.
[34] AirehrourDavid,et al. Secure routing for internet of things , 2016 .
[35] Song Han,et al. ARM: A hybrid specification-based intrusion detection system for rank attacks in 6TiSCH networks , 2017, 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).
[36] Abderrezak Rachedi,et al. A Secure Routing Protocol Based on RPL for Internet of Things , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).