Intrusion Detection System Based RPL Attack Detection Techniques and Countermeasures in IoT: A Comparison
暂无分享,去创建一个
[1] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[2] Geethapriya Thamilarasu,et al. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things , 2019, Sensors.
[3] Rosilah Hassan,et al. A STUDY ON PROTOCOL STACK IN 6LOWPAN MODEL , 2012 .
[4] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[5] Jonathan Loo,et al. Specification-based IDS for securing RPL from topology attacks , 2011, 2011 IFIP Wireless Days (WD).
[6] Elisa Bertino,et al. Kalis — A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[7] Virender Ranga,et al. Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT , 2019, Wireless Personal Communications.
[8] Ali Dehghantanha,et al. Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..
[9] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[10] Jinquan Zeng,et al. Research on immunity-based intrusion detection technology for the Internet of Things , 2011, 2011 Seventh International Conference on Natural Computation.
[11] Abhishek Gupta,et al. Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks , 2013, 2013 IEEE International Conference on Computational Intelligence and Computing Research.
[12] Snehal Deshmukh-Bhosale,et al. A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things , 2019, Procedia Manufacturing.
[13] Hon Sun Chiu,et al. Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .
[14] Pavan Pongle,et al. A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[15] A. Umamakeswari,et al. InDReS: An Intrusion Detection and response system for Internet of Things with 6LoWPAN , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[16] Ismail Ahmedy,et al. Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol , 2018, IEEE Access.
[17] Roger Achkar,et al. A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks , 2019, Int. J. Interdiscip. Telecommun. Netw..
[18] Tsung-Han Lee,et al. A Lightweight Intrusion Detection Scheme Based on Energy Consumption Analysis in 6LowPAN , 2013, EMC/HumanCom.
[19] Anis Koubaa,et al. RPL in a nutshell: A survey , 2012, Comput. Networks.
[20] Michele Nogueira Lima,et al. Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[21] Sanjay Sharma,et al. A study on Need of Adaptation Layer in 6LoWPAN Protocol Stack , 2017 .
[22] Peter Burnap,et al. Pulse: an adaptive intrusion detection for the internet of things , 2018, IoT 2018.
[23] Chung-Horng Lung,et al. Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.
[24] Deokho Kim,et al. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things , 2014, Sensors.