Security explorations for routing attacks in low power networks on internet of things
暂无分享,去创建一个
[1] Roger Achkar,et al. A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks , 2019, Int. J. Interdiscip. Telecommun. Netw..
[2] Mansour Sheikhan,et al. A hybrid intrusion detection architecture for Internet of things , 2016, 2016 8th International Symposium on Telecommunications (IST).
[3] Nicola Fanizzi,et al. Class expression induction as concept space exploration: From DL-Foil to DL-Focl , 2020, Future Gener. Comput. Syst..
[4] Maurizio A. Spirito,et al. Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[5] GaddourOlfa,et al. Survey RPL in a nutshell , 2012 .
[6] Michael Gerndt,et al. Wireless sensors networks for Internet of Things , 2016, 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[7] Remi Badonnel,et al. A Study of RPL DODAG Version Attacks , 2014, AIMS.
[8] Fabrice Theoleyre,et al. Efficient topology construction for RPL over IEEE 802.15.4 in wireless sensor networks , 2014, Ad Hoc Networks.
[9] Azzedine Boukerche,et al. A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-Power and Lossy Networks: A Focus on Core Operations , 2019, IEEE Communications Surveys & Tutorials.
[10] Young-Bae Ko,et al. Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks , 2016, Secur. Commun. Networks.
[11] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[12] Mohammed Bouhorma,et al. Denial-of-Service attacks on 6LoWPAN-RPL networks: Threats and an intrusion detection system proposition , 2014 .
[13] Sema F. Oktug,et al. RPL version number attacks: In-depth study , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[14] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[15] Sanjay Pawar,et al. Node level energy consumption analysis in 6LoWPAN network using real and emulated Zolertia Z1 motes , 2016, 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).
[16] Remi Badonnel,et al. Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks , 2015, Int. J. Netw. Manag..
[17] Snehal Deshmukh-Bhosale,et al. A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things , 2019, Procedia Manufacturing.
[18] Adnan Noor Mian,et al. Experimental study of link quality in IEEE 802.15.4 using Z1 Motes , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).
[19] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[20] Rafael Timóteo de Sousa Júnior,et al. Security analysis of a proposed internet of things middleware , 2017, Cluster Computing.
[21] Chung-Horng Lung,et al. Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.
[22] Barsha Mitra,et al. Efficient Framework for Detection of Version Number Attack in Internet of Things , 2018, ISDA.
[23] Sanjay Pawar,et al. Effect of radio link and network layer parameters on performance of Zolertia Z1 motes based 6LoWPAN , 2017, 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[24] Ashok Kumar Turuk,et al. A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).
[25] Adam Dunkels,et al. Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[26] Mustafa Kocakulak,et al. An overview of Wireless Sensor Networks towards internet of things , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).
[27] Sebastian Thrun,et al. Parallel Stochastic Hill- Climbing with Small Teams , 2005 .
[28] BottaAlessio,et al. Integration of Cloud computing and Internet of Things , 2016 .
[29] Awais Ahmed,et al. A novel and secure attacks detection framework for smart cities industrial internet of things , 2020 .
[30] Pongpisit Wuttidittachotti,et al. Discovery of Suitable Node Number for Wireless Sensor Networks Based on Energy Consumption using Cooja , 2019, 2019 21st International Conference on Advanced Communication Technology (ICACT).
[31] D. Vydeki,et al. Measurement and Analysis of QoS Parameters in RPL Network , 2018, 2018 Tenth International Conference on Advanced Computing (ICoAC).
[32] Amin Karami,et al. A Wormhole Attack Detection and Prevention Technique in Wireless Sensor Networks , 2017 .
[33] B. B. Gupta,et al. Security in Internet of Things: issues, challenges, taxonomy, and architecture , 2017, Telecommunication Systems.
[34] Byomakesh Mahapatra,et al. Performance Evaluation of RPL protocol in a 6LoWPAN based Smart Home Environment , 2020, 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA).
[35] Anis Koubaa,et al. RPL in a nutshell: A survey , 2012, Comput. Networks.
[36] Yeqiong Song,et al. Using Cooja for WSN Simulations: Some New Uses and Limits , 2016, EWSN.
[37] Elie F. Kfoury,et al. Generic hybrid methods for secure connections based on the integration of GBA and TLS/CA , 2017, 2017 Sensors Networks Smart and Emerging Technologies (SENSET).
[38] Remi Badonnel,et al. Addressing DODAG inconsistency attacks in RPL networks , 2014, 2014 Global Information Infrastructure and Networking Symposium (GIIS).
[39] J. Tiberghien,et al. Poster Abstract: Outdoors Range Measurements with Zolertia Z1 Motes and Contiki , 2013, REALWSN.
[40] In-Ho Ra,et al. Multi-Topology Based QoS-Differentiation in RPL for Internet of Things Applications , 2020, IEEE Access.
[41] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[42] Gabi Dreo Rodosek,et al. Towards a trust computing architecture for RPL in Cyber Physical Systems , 2013, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013).
[43] Adam Dunkels,et al. Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[44] Ali Diabat,et al. A comprehensive survey of the Grasshopper optimization algorithm: results, variants, and applications , 2020, Neural Computing and Applications.
[45] Ahmad Y. Javaid,et al. Comparative Analysis of Simulation and Real-World Energy Consumption for Battery-Life Estimation of Low-Power IoT (Internet of Things) Deployment in Varying Environmental Conditions Using Zolertia Z1 Motes , 2016, S-CUBE.
[46] Mohammed Bouhorma,et al. Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions , 2014 .
[47] Gianluca Dini,et al. Implementation of a wormhole attack against a rpl network: Challenges and effects , 2018, 2018 14th Annual Conference on Wireless On-demand Network Systems and Services (WONS).
[48] Chao-Tung Yang,et al. Next-generation Internet of things and cloud security solutions , 2019, Int. J. Distributed Sens. Networks.
[49] Mridula Sharma,et al. Simulating Attacks for RPL and Generating Multi-class Dataset for Supervised Machine Learning , 2019, 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
[50] Pavan Pongle,et al. A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[51] Abderrezak Rachedi,et al. A Secure Routing Protocol Based on RPL for Internet of Things , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[52] Mário Alves,et al. mRPL+: A mobility management framework in RPL/6LoWPAN , 2017, Comput. Commun..
[53] Zhengguo Sheng,et al. Performance Analysis of Routing Protocol for Low Power and Lossy Networks (RPL) in Large Scale Networks , 2017, IEEE Internet of Things Journal.
[54] Constantin F. Aliferis,et al. The max-min hill-climbing Bayesian network structure learning algorithm , 2006, Machine Learning.
[55] Enzo Mingozzi,et al. Implementation of Software-Defined 6LoWPANs in Contiki OS , 2019, 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[56] Manuel Ricardo,et al. Improving the energy efficiency of WSN by using application-layer topologies to constrain RPL-defined routing trees , 2014, 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET).
[57] Byung-Seo Kim,et al. Internet of Things (IoT) Operating Systems Support, Networking Technologies, Applications, and Challenges: A Comparative Review , 2018, IEEE Communications Surveys & Tutorials.
[58] Remi Badonnel,et al. A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..