Denial-of-Service attacks on 6LoWPAN-RPL networks: Threats and an intrusion detection system proposition

RPL (Routing Protocol for Low-power and lossy networks) is a specic routing protocol designed to optimize

[1]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[2]  Kristofer S. J. Pister,et al.  Industrial Routing Requirements in Low-Power and Lossy Networks , 2009, RFC.

[3]  Jerald Martocci,et al.  Building Automation Routing Requirements in Low-Power and Lossy Networks , 2010, RFC.

[4]  Jakob Buron,et al.  Home Automation Routing Requirements in Low-Power and Lossy Networks , 2008, RFC.

[5]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[6]  Gabriel Montenegro,et al.  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.

[7]  David E. Culler,et al.  Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.

[8]  Borhanuddin Mohd Ali,et al.  A Review of 6LoWPAN Routing Protocols , 2010 .

[9]  A. Benslimane,et al.  Analytical study of security aspects in 6LoWPAN networks , 2013, 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M).

[10]  Jonathan Loo,et al.  6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..

[11]  Thomas Narten,et al.  Neighbor Discovery for IP Version 6 (IPv6) , 1996, RFC.

[12]  Sudarshan Tiwari,et al.  Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN): A Survey , 2012, J. Comput. Networks Commun..

[13]  Angel Lozano,et al.  A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs) , 2015, RFC.

[14]  Mark Handley,et al.  Internet Denial-of-Service Considerations , 2006, RFC.

[15]  Guang-xue Yang,et al.  Investigation of Security and Defense System for Home Based on Internet of Things , 2010, 2010 International Conference on Web Information Systems and Mining.

[16]  Carsten Bormann,et al.  Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) , 2012, RFC.

[17]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[18]  Bingwu Liu,et al.  The visions, technologies, applications and security issues of Internet of Things , 2011, 2011 International Conference on E-Business and E-Government (ICEE).

[19]  Horst Schwetlick,et al.  Routing Protocols for 6LoWPAN , 2011, IT Revolutions.

[20]  Dimosthenis Kyriazis,et al.  Sustainable smart city IoT applications: Heat and electricity management & Eco-conscious cruise control for public transportation , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[21]  Tim Winter,et al.  Routing Requirements for Urban Low-Power and Lossy Networks , 2009, RFC.

[22]  J.A. Gutierrez,et al.  IEEE 802.15.4: a developing standard for low-power low-cost wireless personal area networks , 2001, IEEE Network.

[23]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..