-
1
-
-
84953206688
-
A taxonomy of attacks in RPL-based internet of things
-
Mayzaud A, Badonnel R, Chrisment I. A taxonomy of attacks in RPL-based internet of things. Int J Netw Secur 2016; 18:459–473.
-
(2016)
Int J Netw Secur
, vol.18
, pp. 459-473
-
-
Mayzaud, A.1
Badonnel, R.2
Chrisment, I.3
-
2
-
-
84964958468
-
-
Internet Eng Task Force (IETF), Req Comments 6550, 2070-1721, 1–157
-
Winter T, Thubert P, Brandt A, et al. 01 RFC6550 RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. Internet Eng Task Force (IETF), Req Comments 6550, ISSN2070-1721 2012: 1–157.
-
(2012)
01 RFC6550 RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks
-
-
Winter, T.1
Thubert, P.2
Brandt, A.3
-
3
-
-
84881466192
-
-
Secur 2012, Sixth Int Conf Emerg Secur Information, Syst Technol, 157–162
-
Chugh K, Lasebae A, Loo J. Case study of a black hole attack on 6LoWPAN-RPL. Secur 2012, Sixth Int Conf Emerg Secur Information, Syst Technol 2012: 157–162.
-
(2012)
Case study of a black hole attack on 6LoWPAN-RPL
-
-
Chugh, K.1
Lasebae, A.2
Loo, J.3
-
4
-
-
0036804761
-
Routing security in wireless ad hoc networks
-
Agrawal DP. Routing security in wireless ad hoc networks. IEEE Communications Magazine 2002; 40:70–75.
-
(2002)
IEEE Communications Magazine
, vol.40
, pp. 70-75
-
-
Agrawal, D.P.1
-
5
-
-
84906346769
-
-
In, Sun X, Qu W, Stojmenovic I, (eds)., Springer International Publishing, Cham
-
Gao H, Wu R, Cao M, et al. In Detection and Defense Technology of Blackhole Attacks in Wireless Sensor Network, Sun X, Qu W, Stojmenovic I, et al. (eds). Springer International Publishing: Cham, 2014; 601–610.
-
(2014)
Detection and Defense Technology of Blackhole Attacks in Wireless Sensor Network
, pp. 601-610
-
-
Gao, H.1
Wu, R.2
Cao, M.3
-
8
-
-
77956578183
-
A distributed and cooperative algorithm for the detection and elimination of multiple black hole nodes in ad hoc networks
-
Yu CW, Wu T-K, Cheng R-H, et al. A distributed and cooperative algorithm for the detection and elimination of multiple black hole nodes in ad hoc networks. IEICE Transactions on Communications 2009; E92-B:483–490.
-
(2009)
IEICE Transactions on Communications
, vol.E92-B
, pp. 483-490
-
-
Yu, C.W.1
Wu, T.-K.2
Cheng, R.-H.3
-
11
-
-
84885328301
-
SVELTE: real-time intrusion detection in the Internet of Things
-
Raza S, Wallgren L, Voigt T. SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Networks 2013; 11:2661–2674.
-
(2013)
Ad Hoc Networks
, vol.11
, pp. 2661-2674
-
-
Raza, S.1
Wallgren, L.2
Voigt, T.3
-
12
-
-
84964624413
-
Low false alarm attackers detection in RPL by considering timing inconstancy between the rank measurements
-
Matsunaga T, Toyoda IS K. Low false alarm attackers detection in RPL by considering timing inconstancy between the rank measurements. IEICE Commun Express 2015; 4:44–49.
-
(2015)
IEICE Commun Express
, vol.4
, pp. 44-49
-
-
Matsunaga, T.1
Toyoda, K.2
-
13
-
-
83355172286
-
-
VeRA — Version Number and Rank Authentication in RPL. In, IEEE,, 709–714
-
Dvir A, Holczer T, Buttyan L. VeRA — Version Number and Rank Authentication in RPL. In: Proceedings — 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS. IEEE, 2011:709–714.
-
(2011)
Proceedings — 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS
-
-
Dvir, A.1
Holczer, T.2
Buttyan, L.3
-
14
-
-
84883406171
-
The impact of rank attack on network topology of Routing Protocol for Low-Power and Lossy Networks
-
Le A, Loo J, Lasebae A, et al. The impact of rank attack on network topology of Routing Protocol for Low-Power and Lossy Networks. IEEE Sensors Journal 2013; 13:3685–3692.
-
(2013)
IEEE Sensors Journal
, vol.13
, pp. 3685-3692
-
-
Le, A.1
Loo, J.2
Lasebae, A.3
-
16
-
-
84904195643
-
A study of RPL DODAG version attacks
-
In, Springer, Berlin Heidelberg
-
Mayzaud A, Sehgal A, Badonnel R, et al. A study of RPL DODAG version attacks. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer: Berlin Heidelberg, 2014; 92–104.
-
(2014)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 92-104
-
-
Mayzaud, A.1
Sehgal, A.2
Badonnel, R.3
-
18
-
-
84941193111
-
Mitigation of topological inconsistency attacks in RPL-based Low-Power Lossy Networks
-
Mayzaud A, Sehgal A, Badonnel R, et al. Mitigation of topological inconsistency attacks in RPL-based Low-Power Lossy Networks. International Journal of Network Management 2015; 25:320–339.
-
(2015)
International Journal of Network Management
, vol.25
, pp. 320-339
-
-
Mayzaud, A.1
Sehgal, A.2
Badonnel, R.3
-
19
-
-
20544456753
-
-
Proc - Conf Local Comput Networks, LCN, Washington, DC, USA
-
Dunkels A, Grönvall B, Voigt T. Contiki — a lightweight and flexible operating system for tiny networked sensors. Proc - Conf Local Comput Networks, LCN, Washington, DC, USA 2004:455–462.
-
(2004)
Contiki — a lightweight and flexible operating system for tiny networked sensors
, pp. 455-462
-
-
Dunkels, A.1
Grönvall, B.2
Voigt, T.3
-
20
-
-
46149087550
-
-
Cross-level sensor network simulation with COOJA. In, IEEE,, 641–648
-
Österlind F, Dunkels A, Eriksson J, et al. Cross-level sensor network simulation with COOJA. In: Proceedings — Conference on Local Computer Networks, LCN. IEEE, 2006: 641–648.
-
(2006)
Proceedings — Conference on Local Computer Networks, LCN
-
-
Österlind, F.1
Dunkels, A.2
Eriksson, J.3
|