A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks
暂无分享,去创建一个
Sayan Kumar Ray | Jairo A. Gutiérrez | David Airehrour | S. K. Ray | Jairo Gutiérrez | David Airehrour
[1] Ashok Kumar Turuk,et al. A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).
[2] Levente Buttyán,et al. VeRA - Version Number and Rank Authentication in RPL , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.
[3] Syed Obaid Amin,et al. A novel coding scheme to implement signature based IDS in IP based Sensor Networks , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management-Workshops.
[4] Yuanming Wu,et al. Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN , 2014 .
[5] Sayan Kumar Ray,et al. Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..
[6] Maurizio A. Spirito,et al. Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[7] David Chinn,et al. Risk and responsibility in a hyperconnected world: implications for enterprises , 2014 .
[8] Philip Levis,et al. The Minimum Rank with Hysteresis Objective Function , 2012, RFC.
[9] Xiaohui Liang,et al. Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.
[10] More than 50 billion connected devices , 2011 .
[11] Avijit Mathur,et al. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT , 2016, Sensors.
[12] Jonathan Loo,et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..
[13] Kevin Weekly,et al. Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).