T. Tsao, R. Alexander, M. Dohler, V. Daza, and A. Lozano, Work in progress, Security Framework for Routing over Low power and Lossy Networks, IETF Requirement Draft for Routing over Low power and Lossy Networks (ROLL), 2012.

O. Gaddour and A. Koubâa, RPL in a nutshell: A survey, Computer Networks, vol.56, issue.14, 2012.
DOI : 10.1016/j.comnet.2012.06.016

M. Boumessouer, I. Chrisment, and M. Frikha, Analysis of Vulnerabilities and Attacks in the RPL Routing Protocol, in French, 2012.

O. Dabbebi, R. Badonnel, and O. Festor, Managing Risks at Runtime in VoIP Networks and Services, Proc. of the IFIP International Conference on Autonomous Infrastructure, Management and Security, 2010.
DOI : 10.1007/978-3-642-13986-4_11

URL : https://hal.archives-ouvertes.fr/inria-00538685

T. Bedford and R. Cooke, Probabilistic Risk Analysis: Foundations and Methods, 2001.
DOI : 10.1017/CBO9780511813597

A. Gehani and G. Kedem, RheoStat: Real-Time Risk Management, Proc. of the 7th International Symposium RAID'2004, 2004.
DOI : 10.1007/978-3-540-30143-1_16

W. Xie, M. Goyal, H. Hosseini, J. Martocci, Y. Bashir et al., Routing Loops in DAG-Based Low Power and Lossy Networks, 2010 24th IEEE International Conference on Advanced Information Networking and Applications, 2010.
DOI : 10.1109/AINA.2010.126

URL : https://hal.archives-ouvertes.fr/hal-00651582

L. Bartolozzi, T. Pecorella, and R. Fantacci, ns-3 RPL module: IPv6 Routing Protocol for Low power and Lossy Networks, Proceedings of the Fifth International Conference on Simulation Tools and Techniques, 2012.
DOI : 10.4108/icst.simutools.2012.247718