Modeling and analyses of IP spoofing attack in 6LoWPAN network
暂无分享,去创建一个
[1] Joel J. P. C. Rodrigues,et al. Denial of service mitigation approach for IPv6‐enabled smart object networks , 2013, Concurr. Comput. Pract. Exp..
[2] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.
[3] Thomas C. Schmidt,et al. TRAIL: Topology Authentication in RPL , 2016, EWSN.
[4] David E. Culler,et al. Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.
[5] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[6] Sandip C. Patel,et al. Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements , 2008, Int. J. Inf. Manag..
[7] Ki-Hyung Kim,et al. SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN) , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).
[8] Thomas Narten,et al. Neighbor Discovery for IP Version 6 (IPv6) , 1996, RFC.
[9] Hanno Wirtz,et al. 6LoWPAN fragmentation attacks and mitigation mechanisms , 2013, WiSec '13.
[10] Carlier Matthias,et al. Study on impact of adding security in a 6LoWPAN based network , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[11] Raphael C.-W. Phan,et al. Augmented attack tree modeling of SQL injection attacks , 2010, 2010 2nd IEEE International Conference on Information Management and Engineering.
[12] Richard F. Paige,et al. Fault trees for security system design and analysis , 2003, Comput. Secur..
[13] Mohammad Abdollahi Azgomi,et al. Predicting the behavior of attackers and the consequences of attacks against cyber-physical systems , 2016, Secur. Commun. Networks.
[14] Adam Dunkels,et al. Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[15] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[16] Joel J. P. C. Rodrigues,et al. Network Admission Control Solution for 6LoWPAN Networks Based on Symmetric Key Mechanisms , 2016, IEEE Transactions on Industrial Informatics.
[17] Carsten Bormann,et al. Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) , 2012, RFC.
[18] Adam Dunkels,et al. Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[19] Sayan Kumar Ray,et al. Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..
[20] Dong Seong Kim,et al. Cyber security analysis using attack countermeasure trees , 2010, CSIIRW '10.
[21] Jong-Moon Chung,et al. Message Complexity Analysis of Mobile Ad Hoc Network Address Autoconfiguration Protocols , 2008, IEEE Transactions on Mobile Computing.
[22] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[23] Joel J. P. C. Rodrigues,et al. Network Admission Control Solution for 6LoWPAN Networks , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[24] Yu Liu,et al. Network vulnerability assessment using Bayesian networks , 2005, SPIE Defense + Commercial Sensing.
[25] Siarhei Kuryla,et al. RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .
[26] Jonathan Loo,et al. The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.
[27] Thomas R. Henderson,et al. Host Identity Protocol Version 2 (HIPv2) , 2015, RFC.
[28] Rajesh Kumar,et al. Quantitative Attack Tree Analysis via Priced Timed Automata , 2015, FORMATS.
[29] Maode Ma,et al. A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks , 2016, IEEE Transactions on Industrial Informatics.
[30] Azeddine Bilami,et al. Compressed and distributed host identity protocol for end-to-end security in the IoT , 2014, 2014 International Conference on Next Generation Networks and Services (NGNS).
[31] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[32] Monali Mavani,et al. Experimental study of IP spoofing attack in 6LoWPAN network , 2017, 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence.
[33] Jessye Dos Santos,et al. Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis , 2014, IEEE Internet of Things Journal.
[34] Remi Badonnel,et al. A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..
[35] Stefano Bistarelli,et al. Defense trees for economic evaluation of security investments , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[36] Jaime C. Acosta,et al. Augmenting attack graphs to represent data link and network layer vulnerabilities , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[37] Bülent Yener,et al. Modeling and detection of complex attacks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[38] Adam Dunkels,et al. Software-based on-line energy estimation for sensor nodes , 2007, EmNets '07.
[39] Sipra Das Bit,et al. LoWaNA: low overhead watermark based node authentication in WSN , 2016, Wirel. Networks.
[40] S. Seidel,et al. 914 MHz path loss prediction models for indoor wireless communications in multifloored buildings , 1992 .
[41] Jorge Sá Silva,et al. Enabling Network-Layer Security on IPv6 Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[42] Utz Roedig,et al. Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[43] Stephen E. Deering,et al. Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) , 1995, RFC.
[44] Christoph Meinel,et al. 6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer , 2013, ASPI '13.
[45] Ingrid Moerman,et al. Characterization of On-Body Communication Channel and Energy Efficient Topology Design for Wireless Body Area Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.