共 30 条
[1]
A Distributed and Cooperative Verification Mechanism to Defend against DODAG Version Number Attack in RPL
[J].
PECCS: PROCEEDINGS OF THE 6TH INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND EMBEDDED COMPUTING AND COMMUNICATION SYSTEMS,
2016,
:55-62
[2]
[Anonymous], 2015, CONTIKI CONTIKI OPEN
[3]
[Anonymous], 2016, A Taxonomy of Attacks in RPL-based Internet of Things
[4]
[Anonymous], CONF GUID
[5]
[Anonymous], 2016, P 2016 INT C EMB WIR
[6]
[Anonymous], 2012, IEEE Std 802.15.4-2011
[7]
[Anonymous], 2015, Proc. Intl. Conf. Pervasive Comput. (ICPC)
[8]
Arce Ivan, 2014, TECHNICAL REPORT
[9]
Aris A., SECURITY INTERNET TH, P337, DOI [10.1007/978-3-319-90415-3_13, DOI 10.1007/978-3-319-90415-3_13]
[10]
Aris A, 2016, IEEE IFIP NETW OPER, P776, DOI 10.1109/NOMS.2016.7502897