The Flooding Attack in Low Power and Lossy Networks: A Case Study
暂无分享,去创建一个
Hai Anh TRAN | Tanh NGUYEN | Tri NGO | Tuyen NGUYEN | Duc TRAN | Tung BUI | Tanh T. N. Nguyen | Duc Tran | H. Tran | Tuyen Nguyen | Tung Bui | T. Ngo
[1] Marco Conti,et al. The role of the RPL routing protocol for smart grid communications , 2013, IEEE Communications Magazine.
[2] Jonathan Loo,et al. A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology , 2016, Inf..
[3] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[4] Vashek Matyas,et al. Neighbor-Based Intrusion Detection for Wireless Sensor Networks , 2010, 2010 6th International Conference on Wireless and Mobile Communications.
[5] Remi Badonnel,et al. A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..
[6] David E. Culler,et al. Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[7] Sayan Kumar Ray,et al. Securing RPL routing protocol from blackhole attacks using a trust-based mechanism , 2016, 2016 26th International Telecommunication Networks and Applications Conference (ITNAC).
[8] Angel Lozano,et al. A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs) , 2015, RFC.
[9] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[10] Jonathan Loo,et al. The impacts of internal threats towards Routing Protocol for Low power and lossy network performance , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).
[11] Siarhei Kuryla,et al. RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .
[12] Jonathan Loo,et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..