A. [. Atzori, G. Iera, . [. Morabito, R. Bedford, and . Cooke, The Internet of Things: A survey, Computer Networks, vol.54, issue.15, pp.2787-2805, 2001.
DOI : 10.1016/j.comnet.2010.05.010

O. Dabbebi, R. Badonnel, and O. Festor, Managing Risks at Runtime in VoIP Networks and Services, IFIP AIMS'2010, pp.89-92, 2010.
DOI : 10.1007/978-3-642-13986-4_11

URL : https://hal.archives-ouvertes.fr/inria-00538685

A. Dvir, T. Holczer, B. [. Buttyán, K. Gehani, . J. Gershon et al., VeRA -Version Number and Rank Authentication in RPL RheoStat : Real-time Risk Management The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams, MASS Proc. of the 7th International Symposium on Recent Advances in Intrusion Detection Sehgal, and J. Schönwälder. A Study of the RPL Repair Process Using ContikiRPL IFIP AIMS, pp.709-714, 2004.

. Lch-+-11-]-p, T. Levis, J. Clausen, O. Hui, J. Gnawali et al., The Trickle Algorithm, RFC, vol.6206, 2011.

. Lpu-+-13-]-m, H. Landsmann, . Perrey, M. Ugus, T. C. Wählisch et al., Topology Authentication in RPL, Proc. of the 32nd IEEE INFOCOM. Poster, 2013.

P. Levis, A. Tavakoli, and S. Dawson-haggerty, Overview of Existing Routing Protocols for Low Power and Lossy Networks, IETF Internet Draft : draft- ietf-roll-protocols-survey-07, 2009.

]. A. Mayzaud, A. Sehgal, R. Badonnel, I. Chrisment, and J. Schönwälder, A Study of RPL DODAG Version Attacks (accepted), AIMS, 2014. [NIS95] NIST. An Introduction to Computer Security : The NIST Handbook, 1995.

R. T. Tsao, M. Alexander, V. Dohler, . Daza, M. Lozano et al., A Security Threat Analysis for Routing Protocol for Low-power and Lossy Networks (RPL), IETF Requirement Draft for Routing over Low power and Lossy Networks (ROLL), Work in progress, 2013.
DOI : 10.17487/rfc7416