共 22 条
[1]
A Distributed and Cooperative Verification Mechanism to Defend against DODAG Version Number Attack in RPL
[J].
PECCS: PROCEEDINGS OF THE 6TH INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND EMBEDDED COMPUTING AND COMMUNICATION SYSTEMS,
2016,
:55-62
[2]
SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2019, 93
:860-876
[3]
A Lightweight Scheme for Mitigating RPL Version Number Attacks in IoT Networks
[J].
IEEE ACCESS,
2022, 10
:111115-111133
[4]
Alzubaidi M., 2018, Journal of Communication, V13, P198
[6]
[Anonymous], 2015, Int. J. Comput. Appl.
[7]
Analysis of the RPL Version Number Attack with Multiple Attackers
[J].
2020 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2020),
2020,
[9]
Aris A, 2016, IEEE IFIP NETW OPER, P776, DOI 10.1109/NOMS.2016.7502897
[10]
Glissa G, 2016, IEEE GLOB COMM CONF