S. Seeber, A. Sehgal, B. Stelte, G. D. Rodosek, and J. Schönwälder, Towards a trust computing architecture for RPL in Cyber Physical Systems, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013), 2013.
DOI : 10.1109/CNSM.2013.6727823

A. Sehgal, V. Perelman, S. Kuryla, and J. Schönwälder, Management of resource constrained devices in the internet of things, IEEE Communications Magazine, vol.50, issue.12, pp.144-149, 2012.
DOI : 10.1109/MCOM.2012.6384464

A. Dunkels, B. Gronvall, and T. Voigt, Contiki - a lightweight and flexible operating system for tiny networked sensors, 29th Annual IEEE International Conference on Local Computer Networks, 2004.
DOI : 10.1109/LCN.2004.38

J. Ko, S. Dawson-haggerty, O. Gnawali, D. Culler, and A. Terzis, Evaluating the Performance of RPL and 6LoWPAN in TinyOS, Workshop on Extending the Internet to Low Power and Lossy Networks (IP+SN), 2011.

E. Baccelli, O. Hahm, M. Günes, M. Wählisch, and T. C. Schmidt, RIOT OS: Towards an OS for the Internet of Things, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2013.
DOI : 10.1109/INFCOMW.2013.6970748

URL : https://hal.archives-ouvertes.fr/hal-00945122

T. Cheneau, SimpleRPL. https, 2014.

T. Tsao, R. Alexander, M. Dohler, V. Daza, A. Lozano et al., A Security Threat Analysis for Routing Protocol for Low-power and Lossy Networks (RPL). IETF Internet Draft <draft-ietf-roll-security-threats-06>, 2013.

K. Chugh, L. Aboubaker, and J. Loo, Case Study of a Black Hole Attack on LoWPAN-RPL, Proc. of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), pp.157-162, 2012.

K. Weekly and K. Pister, Evaluating sinkhole defense techniques in RPL networks, 2012 20th IEEE International Conference on Network Protocols (ICNP), pp.1-6, 2012.
DOI : 10.1109/ICNP.2012.6459948

L. Wallgren, S. Raza, and T. Voigt, Routing Attacks and Countermeasures in the RPL-Based Internet of Things, International Journal of Distributed Sensor Networks, vol.2, issue.8, 2013.
DOI : 10.1109/ICC.2006.255595

A. Dvir, T. Holczer, and L. Buttyan, VeRA - Version Number and Rank Authentication in RPL, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, pp.709-714, 2011.
DOI : 10.1109/MASS.2011.76

H. Perrey, M. Landsmann, O. Ugus, M. Wählisch, and T. Schmidt, TRAIL: Topology Authentication in RPL. arXiv preprint, 2013.

P. A. Levis, N. Patel, D. Culler, and S. Shenker, Trickle: A Self Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks, 1st Symposium on Networked Systems Design and Implementation (NSDI), 2004.

J. Hui and J. Vasseur, The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams, IETF RFC, vol.6553, 2012.
DOI : 10.17487/rfc6553

K. Korte, A. Sehgal, and J. Schönwälder, A Study of the RPL Repair Process Using ContikiRPL, 6th International Conference on Autonomous Infrastructure, Management and Security (AIMS), pp.50-61, 2012.
DOI : 10.1007/978-3-642-30633-4_8

F. Osterlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt, Cross-Level Sensor Network Simulation with COOJA, Proceedings. 2006 31st IEEE Conference on Local Computer Networks, pp.641-648, 2006.
DOI : 10.1109/LCN.2006.322172

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.221.419