메뉴 건너뛰기




Volumn 2013, Issue , 2013, Pages

Routing attacks and countermeasures in the RPL-based internet of things

Author keywords

[No Author keywords available]

Indexed keywords

COMPREHENSIVE ANALYSIS; CONTIKI OPERATING SYSTEMS; INTERNET OF THINGS (IOT); IPV6 PROTOCOL; LOSSY NETWORKS; ROUTING ATTACKS; SECURITY CAPABILITY; SECURITY FEATURES;

EID: 84884229742     PISSN: 15501329     EISSN: 15501477     Source Type: Journal    
DOI: 10.1155/2013/794326     Document Type: Article
Times cited : (409)

References (23)
  • 2
    • 70449596680 scopus 로고    scopus 로고
    • IPv6 over low-power wireless personalArea networks (6LoWPANs): Overview, assumptions, problem statement, and goals
    • Kushalnagar N., Montenegro G., Schumacher C., IPv6 over low-power wireless personalArea networks (6LoWPANs): overview, assumptions, problem statement, and goals. RFC 2007 4919
    • (2007) RFC , Issue.4919
    • Kushalnagar, N.1    Montenegro, G.2    Schumacher, C.3
  • 11
    • 84861982926 scopus 로고    scopus 로고
    • Compression format for IPv6 datagrams over IEEE 802.15.4-basednetworks
    • Hui J., Thubert P., Compression format for IPv6 datagrams over IEEE 802.15.4-basednetworks. RFC 2011 6282
    • (2011) RFC , Issue.6282
    • Hui, J.1    Thubert, P.2
  • 12
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • 2-s2.0-2942656255 10.1016/S1570-8705(03)00008-8
    • Karlof C., Wagner D., Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 2003 1 2 293 315 2-s2.0-2942656255 10.1016/S1570-8705(03)00008-8
    • (2003) Ad Hoc Networks , vol.1 , Issue.2 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 18
    • 84864217683 scopus 로고    scopus 로고
    • The ContikiMAC radio duty cycling protocol
    • Dunkels A., The ContikiMAC radio duty cycling protocol. SICS Technical Report 2011 T2011:13
    • (2011) SICS Technical Report
    • Dunkels, A.1
  • 19
    • 42549138436 scopus 로고    scopus 로고
    • On the intruder detection for sinkhole attack in wireless sensor networks
    • IEEE 2-s2.0-42549138436 10.1109/ICC.2006.255595
    • Ngai E. C. H., Liu J., Lyu M. R., On the intruder detection for sinkhole attack in wireless sensor networks. 8 Proceeding of the IEEE International Conference on Communications (ICC '06) 2006 IEEE 3383 3389 2-s2.0-42549138436 10.1109/ICC.2006.255595
    • (2006) Proceeding of the IEEE International Conference on Communications (ICC '06) , vol.8 , pp. 3383-3389
    • Ngai, E.C.H.1    Liu, J.2    Lyu, M.R.3
  • 23
    • 77958513829 scopus 로고    scopus 로고
    • Internet control message protocol (ICMPv6) forthe internet protocol version 6 (IPv6) specification
    • Updated by RFC 488414
    • Conta A., Deering S., Gupta M., Internet control message protocol (ICMPv6) forthe internet protocol version 6 (IPv6) specification. RFC 2006 Updated by RFC 488414 4443 (Draft Standard)
    • (2006) RFC
    • Conta, A.1    Deering, S.2    Gupta, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.