T. Phinney, P. Thubert, and R. Assimiti, RPL Applicability in Industrial Networks. IETF I-D <draft-ietf-roll-rpl- industrial-applicability-02>, 2013.

A. Brandt, E. Baccelli, R. Cragie, and P. Van-der-stok, Applicability Statement: The use of the RPL protocol suite in Home Automation and Building Control. IETF I-D <draft-ietf-roll-applicability-home-building, 2014.

D. Popa, M. Gillmore, L. Toutain, J. Hui, R. Ruben et al., Applicability Statement for the Routing Protocol for Low Power and Lossy Networks (RPL) in AMI Networks. IETF I-D <draft-ietf-roll-applicability-ami, 2014.

S. Seeber, A. Sehgal, B. Stelte, G. Rodosek, and J. Schönwälder, Towards a trust computing architecture for RPL in Cyber Physical Systems, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013), 2013.
DOI : 10.1109/CNSM.2013.6727823

A. Sehgal, V. Perelman, S. Kuryla, and J. Schönwälder, Management of resource constrained devices in the internet of things, IEEE Communications Magazine, vol.50, issue.12, pp.144-149, 2012.
DOI : 10.1109/MCOM.2012.6384464

J. Hui and J. Vasseur, The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams. IETF RFC 6553, 2012.

H. Leligou, P. Trakadas, S. Maniatis, P. Karkazis, and T. Zahariadis, Combining trust with location information for routing in wireless sensor networks, Wireless Communications and Mobile Computing, vol.21, issue.4, pp.1091-1103, 2012.
DOI : 10.1002/wcm.1038

T. Tsao, R. Alexander, M. Dohler, V. Daza, A. Lozano et al., A Security Threat Analysis for Routing Protocol for Low-power and Lossy Networks (RPL). IETF I-D <draft-ietf-roll-security-threats, 2013.

A. Dvir, T. Holczer, and L. Buttyan, VeRA - Version Number and Rank Authentication in RPL, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, pp.709-714, 2011.
DOI : 10.1109/MASS.2011.76

K. Chugh, L. Aboubaker, and J. Loo, Case Study of a Black Hole Attack on LoWPAN-RPL, Proc. of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), 2012.

A. Mayzaud, A. Sehgal, R. Badonnel, I. Chrisment, and J. Schönwälder, A Study of RPL DODAG Version Attacks, Proc. of AIMS conference, 2014.
DOI : 10.1007/978-3-662-43862-6_12

URL : https://hal.archives-ouvertes.fr/hal-01090993

K. Weekly and K. Pister, Evaluating sinkhole defense techniques in RPL networks, 2012 20th IEEE International Conference on Network Protocols (ICNP), pp.1-6, 2012.
DOI : 10.1109/ICNP.2012.6459948

A. Le, J. Loo, A. Lasebae, A. Vinel, Y. Chen et al., The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks, IEEE Sensors Journal, vol.13, issue.10, pp.3685-3692, 2013.
DOI : 10.1109/JSEN.2013.2266399

A. Sehgal, A. Mayzaud, R. Badonnel, I. Chrisment, and J. Schönwälder, Addressing DODAG inconsistency attacks in RPL networks, 2014 Global Information Infrastructure and Networking Symposium (GIIS), 2014.
DOI : 10.1109/GIIS.2014.6934253

URL : https://hal.archives-ouvertes.fr/hal-01090986

P. Levis, N. Patel, D. Culler, and S. Shenker, Trickle: A Self Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks, 1st Symposium on Networked Systems Design and Implementation (NSDI), 2004.

T. Clausen and U. Herberg, A Comparative Performance Study of the Routing Protocols LOAD and RPL with Bi- Directional Traffic in Low-power and Lossy Networks (LLN) Master's Thesis, Ecole Polytechnique, 2011.

A. Dunkels, B. Gronvall, and T. Voigt, Contiki - a lightweight and flexible operating system for tiny networked sensors, 29th Annual IEEE International Conference on Local Computer Networks, pp.455-462, 2004.
DOI : 10.1109/LCN.2004.38

F. Osterlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt, Cross-Level Sensor Network Simulation with COOJA, Proceedings. 2006 31st IEEE Conference on Local Computer Networks, pp.641-648, 2006.
DOI : 10.1109/LCN.2006.322172

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.221.419

S. Dawans, S. Duquennoy, and O. Bonaventure, On link estimation in dense RPL deployments, 37th Annual IEEE Conference on Local Computer Networks -- Workshops, 2012.
DOI : 10.1109/LCNW.2012.6424087

A. Chipcon, /ZigBee-ready RF Transceiver, 2004.