Towards a trust computing architecture for RPL in Cyber Physical Systems, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013), 2013. ,
DOI : 10.1109/CNSM.2013.6727823
Management of resource constrained devices in the internet of things, IEEE Communications Magazine, vol.50, issue.12, pp.144-149, 2012. ,
DOI : 10.1109/MCOM.2012.6384464
Evaluating the Performance of RPL and 6LoWPAN in TinyOS, Workshop on Extending the Internet to Low Power and Lossy Networks (IP+SN), 2011. ,
The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams, 2012. ,
DOI : 10.17487/rfc6553
Combining trust with location information for routing in wireless sensor networks, Wireless Communications and Mobile Computing, vol.21, issue.4, pp.1091-1103, 2012. ,
DOI : 10.1002/wcm.1038
A Security Framework for Routing over Low Power and Lossy Networks, " IETF I-D <draft-ietf-roll-security-framework-07>, 2012. ,
Case Study of a Black Hole Attack on LoWPAN-RPL, Proc. of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), pp.157-162, 2012. ,
VeRA - Version Number and Rank Authentication in RPL, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, pp.709-714, 2011. ,
DOI : 10.1109/MASS.2011.76
Specification-based IDS for securing RPL from topology attacks, 2011 IFIP Wireless Days (WD), pp.1-3, 2011. ,
DOI : 10.1109/WD.2011.6098218
Evaluating sinkhole defense techniques in RPL networks, 2012 20th IEEE International Conference on Network Protocols (ICNP), pp.1-6, 2012. ,
DOI : 10.1109/ICNP.2012.6459948
Trickle: A Self Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks, 1st Symposium on Networked Systems Design and Implementation (NSDI), 2004. ,