共 13 条
[1]
Khan M. M., Lodhi M. A., Rehman A., Khan A., Hussain F. B., Sink-to-Sink Coordination Framework using RPL: Routing Protocol for Low Power and Lossy Networks, Journal of Sensors, 2016, (2016)
[2]
Chaudhari H. C., Kadam L. U., Wireless Sensor Networks: Security, Attacks and Challenges, International Journal of Networking, 1, 1, pp. 859-868, (2011)
[3]
Janani P., Diniesh V. C., Jude M. J. A., Impact of Path Metrics on RPL’s Performance in Low Power and Lossy Networks, 2018 International Conference on Communication and Signal Processing (ICCSP), pp. 0835-0839, (2018)
[4]
Ma G., Li X., Pei Q., Li Z., A Security Routing Protocol for Internet of Things Based on RPL, 2017 International Conference on Networking and Network Applications (NaNA), pp. 209-213, (2017)
[5]
Abdullah I., Muntasir Rahman M., Chandra Roy M., Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count, International Journal of Computer Network and Information Security, 7, 3, pp. 50-56, (2015)
[6]
Prajapati R., Manjhi N., Grid Base Cluster Approach for Detection of Sinkhole Attack in WSN, International Journal of Engineering and Computer Science, 5, 17571, pp. 17571-17576, (2016)
[7]
Dvir A., Holczer T., Buttyan L., VeRA-Version Number and Rank Authentication in RPL, Proc. - 8th IEEE Int. Conf. Mob. Ad-hoc Sens. Syst. MASS 2011, pp. 709-714, (2011)
[8]
Le A., Loo J., Chai K. K., Aiash M., A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology, Information, 7, 2, (2016)
[9]
Sheela D., Kumar C. N., Mahadevan G., A Non Cryptographic Method of Sink Hole Attack Detection in Wireless Sensor Networks, IEEE-International Conference on Recent Trends in Information Technology (ICRTIT), pp. 527-532, (2011)
[10]
Zhang Z., Liu S., Bai Y., Zheng Y., M Optimal Routes Hops Strategy: Detecting Sinkhole Attacks in Wireless Sensor Networks, Cluster Computing, 6, pp. 1-9, (2018)