메뉴 건너뛰기




Volumn 9, Issue 18, 2016, Pages 5143-5154

Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks

Author keywords

black hole attack; mitigation; RPL; security; suspicious; verification

Indexed keywords

COPYRIGHTS; GRAVITATION; INTERNET PROTOCOLS; LOW POWER ELECTRONICS; NETWORK LAYERS; NETWORK ROUTING; PACKET NETWORKS; ROUTING PROTOCOLS; SENSOR NODES; STARS; VERIFICATION;

EID: 85001907801     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.1684     Document Type: Article
Times cited : (77)

References (21)
  • 1
    • 84953206688 scopus 로고    scopus 로고
    • A taxonomy of attacks in RPL-based internet of things
    • Mayzaud A, Badonnel R, Chrisment I. A taxonomy of attacks in RPL-based internet of things. Int J Netw Secur 2016; 18:459–473.
    • (2016) Int J Netw Secur , vol.18 , pp. 459-473
    • Mayzaud, A.1    Badonnel, R.2    Chrisment, I.3
  • 4
    • 0036804761 scopus 로고    scopus 로고
    • Routing security in wireless ad hoc networks
    • Agrawal DP. Routing security in wireless ad hoc networks. IEEE Communications Magazine 2002; 40:70–75.
    • (2002) IEEE Communications Magazine , vol.40 , pp. 70-75
    • Agrawal, D.P.1
  • 8
    • 77956578183 scopus 로고    scopus 로고
    • A distributed and cooperative algorithm for the detection and elimination of multiple black hole nodes in ad hoc networks
    • Yu CW, Wu T-K, Cheng R-H, et al. A distributed and cooperative algorithm for the detection and elimination of multiple black hole nodes in ad hoc networks. IEICE Transactions on Communications 2009; E92-B:483–490.
    • (2009) IEICE Transactions on Communications , vol.E92-B , pp. 483-490
    • Yu, C.W.1    Wu, T.-K.2    Cheng, R.-H.3
  • 11
    • 84885328301 scopus 로고    scopus 로고
    • SVELTE: real-time intrusion detection in the Internet of Things
    • Raza S, Wallgren L, Voigt T. SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Networks 2013; 11:2661–2674.
    • (2013) Ad Hoc Networks , vol.11 , pp. 2661-2674
    • Raza, S.1    Wallgren, L.2    Voigt, T.3
  • 12
    • 84964624413 scopus 로고    scopus 로고
    • Low false alarm attackers detection in RPL by considering timing inconstancy between the rank measurements
    • Matsunaga T, Toyoda IS K. Low false alarm attackers detection in RPL by considering timing inconstancy between the rank measurements. IEICE Commun Express 2015; 4:44–49.
    • (2015) IEICE Commun Express , vol.4 , pp. 44-49
    • Matsunaga, T.1    Toyoda, K.2
  • 14
    • 84883406171 scopus 로고    scopus 로고
    • The impact of rank attack on network topology of Routing Protocol for Low-Power and Lossy Networks
    • Le A, Loo J, Lasebae A, et al. The impact of rank attack on network topology of Routing Protocol for Low-Power and Lossy Networks. IEEE Sensors Journal 2013; 13:3685–3692.
    • (2013) IEEE Sensors Journal , vol.13 , pp. 3685-3692
    • Le, A.1    Loo, J.2    Lasebae, A.3
  • 15
    • 84884229742 scopus 로고    scopus 로고
    • Routing attacks and countermeasures in the RPL-based Internet of Things
    • accessed 1 June 2016)
    • Wallgren L, Raza S, Voigt T. Routing attacks and countermeasures in the RPL-based Internet of Things. International Journal of Distributed Sensor Networks. http://soda.swedishict.se/5522/(2013, accessed 1 June 2016).
    • (2013) International Journal of Distributed Sensor Networks
    • Wallgren, L.1    Raza, S.2    Voigt, T.3
  • 18
    • 84941193111 scopus 로고    scopus 로고
    • Mitigation of topological inconsistency attacks in RPL-based Low-Power Lossy Networks
    • Mayzaud A, Sehgal A, Badonnel R, et al. Mitigation of topological inconsistency attacks in RPL-based Low-Power Lossy Networks. International Journal of Network Management 2015; 25:320–339.
    • (2015) International Journal of Network Management , vol.25 , pp. 320-339
    • Mayzaud, A.1    Sehgal, A.2    Badonnel, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.