S. Seeber, A. Sehgal, B. Stelte, G. D. Rodosek, and J. Schönwälder, Towards a trust computing architecture for RPL in Cyber Physical Systems, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013), 2013.
DOI : 10.1109/CNSM.2013.6727823

A. Sehgal, V. Perelman, S. Kuryla, and J. Schönwälder, Management of resource constrained devices in the internet of things, IEEE Communications Magazine, vol.50, issue.12, pp.144-149, 2012.
DOI : 10.1109/MCOM.2012.6384464

J. Ko, S. Dawson-haggerty, O. Gnawali, D. Culler, and A. Terzis, Evaluating the Performance of RPL and 6LoWPAN in TinyOS, Workshop on Extending the Internet to Low Power and Lossy Networks (IP+SN), 2011.

J. Hui and J. Vasseur, The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams, 2012.
DOI : 10.17487/rfc6553

H. Leligou, P. Trakadas, S. Maniatis, P. Karkazis, and T. Zahariadis, Combining trust with location information for routing in wireless sensor networks, Wireless Communications and Mobile Computing, vol.21, issue.4, pp.1091-1103, 2012.
DOI : 10.1002/wcm.1038

T. Tsao, R. Alexander, M. Dohler, V. Daza, and A. Lozano, A Security Framework for Routing over Low Power and Lossy Networks, " IETF I-D <draft-ietf-roll-security-framework-07>, 2012.

K. Chugh, L. Aboubaker, and J. Loo, Case Study of a Black Hole Attack on LoWPAN-RPL, Proc. of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), pp.157-162, 2012.

A. Dvir, T. Holczer, and L. Buttyan, VeRA - Version Number and Rank Authentication in RPL, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, pp.709-714, 2011.
DOI : 10.1109/MASS.2011.76

A. Le, J. Loo, Y. Luo, and A. Lasebae, Specification-based IDS for securing RPL from topology attacks, 2011 IFIP Wireless Days (WD), pp.1-3, 2011.
DOI : 10.1109/WD.2011.6098218

K. Weekly and K. Pister, Evaluating sinkhole defense techniques in RPL networks, 2012 20th IEEE International Conference on Network Protocols (ICNP), pp.1-6, 2012.
DOI : 10.1109/ICNP.2012.6459948

P. A. Levis, N. Patel, D. Culler, and S. Shenker, Trickle: A Self Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks, 1st Symposium on Networked Systems Design and Implementation (NSDI), 2004.