The Internet of Things: A survey, Computer Networks, vol.54, issue.15, pp.2787-2805, 2001. ,
DOI : 10.1016/j.comnet.2010.05.010
Managing Risks at Runtime in VoIP Networks and Services, IFIP AIMS'2010, pp.89-92, 2010. ,
DOI : 10.1007/978-3-642-13986-4_11
URL : https://hal.archives-ouvertes.fr/inria-00538685
VeRA -Version Number and Rank Authentication in RPL RheoStat : Real-time Risk Management The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams, MASS Proc. of the 7th International Symposium on Recent Advances in Intrusion Detection Sehgal, and J. Schönwälder. A Study of the RPL Repair Process Using ContikiRPL IFIP AIMS, pp.709-714, 2004. ,
The Trickle Algorithm, RFC, vol.6206, 2011. ,
Topology Authentication in RPL, Proc. of the 32nd IEEE INFOCOM. Poster, 2013. ,
Overview of Existing Routing Protocols for Low Power and Lossy Networks, IETF Internet Draft : draft- ietf-roll-protocols-survey-07, 2009. ,
A Study of RPL DODAG Version Attacks (accepted), AIMS, 2014. [NIS95] NIST. An Introduction to Computer Security : The NIST Handbook, 1995. ,
A Security Threat Analysis for Routing Protocol for Low-power and Lossy Networks (RPL), IETF Requirement Draft for Routing over Low power and Lossy Networks (ROLL), Work in progress, 2013. ,
DOI : 10.17487/rfc7416