A survey of secure mobile Ad Hoc routing protocols, IEEE Communications Surveys & Tutorials, vol.10, issue.4, pp.78-93, 2008. ,
DOI : 10.1109/SURV.2008.080407
Generic Threats to Routing Protocols, RFC, vol.4593, 2006. ,
DOI : 10.17487/rfc4593
Applicability Statement: The Use of the RPL Protocol Set in Home Automation and Building Control, 2014. ,
Case study of a black hole attack on 6lowpan-RPL, Proceedings of the SECURWARE Conference, pp.157-162, 2012. ,
A survey of security issues in mobile ad hoc and sensor networks, IEEE Communications Surveys & Tutorials, vol.7, issue.4, pp.2-28, 2005. ,
DOI : 10.1109/COMST.2005.1593277
The Sybil Attack, First International Workshop on Peer-to-Peer Systems (IPTPS'01), pp.251-260, 2002. ,
DOI : 10.1007/3-540-45748-8_24
VeRA - Version Number and Rank Authentication in RPL, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, pp.709-714, 2011. ,
DOI : 10.1109/MASS.2011.76
RPL in a nutshell: A survey, Computer Networks, vol.56, issue.14, pp.3163-3178, 2012. ,
DOI : 10.1016/j.comnet.2012.06.016
An Introduction to Computer Security: The NIST Handbook, NIST Special Publication 800-12, NIST, 1995. ,
DOI : 10.6028/NIST.SP.800-12
The Routing Protocol for Low- Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams, Internet Engineering Task Force, 2012. ,
DOI : 10.17487/rfc6553
Wormhole attack prevention mechanism for RPL based LLN network, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN), pp.149-154, 2013. ,
DOI : 10.1109/ICUFN.2013.6614801
A Study of the RPL Repair Process Using ContikiRPL, Proceedings of Dependable Networks and Services, pp.50-61, 2012. ,
DOI : 10.1007/978-3-642-30633-4_8
Topology Authentication in RPL, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.73-74, 2013. ,
DOI : 10.1109/INFCOMW.2013.6970745
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach, International Journal of Communication Systems, vol.4, issue.2005, pp.1189-1212, 2012. ,
DOI : 10.1002/dac.2356
The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks, IEEE Sensors Journal, vol.13, issue.10, pp.3685-3692, 2013. ,
DOI : 10.1109/JSEN.2013.2266399
Specification-based IDS for securing RPL from topology attacks, 2011 IFIP Wireless Days (WD), pp.1-3, 2011. ,
DOI : 10.1109/WD.2011.6098218
The impacts of internal threats towards Routing Protocol for Low power and lossy network performance, 2013 IEEE Symposium on Computers and Communications (ISCC), pp.789-794, 2013. ,
DOI : 10.1109/ISCC.2013.6755045
The Trickle Algorithm Internet Engineering Task Force Overview of Existing Routing Protocols for Low Power and Lossy Networks, Internet Engineering Task Force (IETF) Internet Draft: draft-ietf-roll-protocols-survey-07, 2009. ,
Monitoring and Security for the Internet of Things, Emerging Management Mechanisms for the Future Internet, pp.37-40, 2013. ,
DOI : 10.1007/978-3-642-38998-6_4
URL : https://hal.archives-ouvertes.fr/hal-00876216
A Study of RPL DODAG Version Attacks, Monitoring and Securing Virtualized Networks and Services, pp.92-104, 2014. ,
DOI : 10.1007/978-3-662-43862-6_12
URL : https://hal.archives-ouvertes.fr/hal-01090993
Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks, International Journal of Network Management, vol.13, issue.10, 2015. ,
DOI : 10.1002/nem.1898
URL : https://hal.archives-ouvertes.fr/hal-01207843
A survey: Attacks on RPL and 6LoWPAN in IoT, 2015 International Conference on Pervasive Computing (ICPC), pp.1-6, 2015. ,
DOI : 10.1109/PERVASIVE.2015.7087034
SVELTE: Real-time intrusion detection in the Internet of Things, Ad Hoc Networks, pp.2661-2674, 2013. ,
DOI : 10.1016/j.adhoc.2013.04.014
Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions, Journal of Advanced Computer Science & Technology, vol.3, issue.2, pp.143-153, 2014. ,
DOI : 10.14419/jacst.v3i2.3321
Addressing DODDAG inconsistency attacks in RPL networks, Proceedings of Global Information Infrastructure and Networking Symposium (GIIS'14), pp.1-8, 2014. ,
A Security Threat Analysis for Routing Protocol for Low-power and Lossy Networks (RPLs), RFC 7416, 2015. ,
Routing Attacks and Countermeasures in the RPL-Based Internet of Things, International Journal of Distributed Sensor Networks, vol.2, issue.8, pp.1-11, 2013. ,
DOI : 10.1109/ICC.2006.255595
A survey of security issues in wireless sensor networks, IEEE Communications Surveys & Tutorials, vol.8, issue.2, pp.2-23, 2006. ,
DOI : 10.1109/COMST.2006.315852
Evaluating sinkhole defense techniques in RPL networks, 2012 20th IEEE International Conference on Network Protocols (ICNP), pp.1-6, 2012. ,
DOI : 10.1109/ICNP.2012.6459948
RPL: IPv6 routing protocol for lowpower and lossy networks, 2012. ,
Routing Loops in DAG-Based Low Power and Lossy Networks, 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp.888-895, 2010. ,
DOI : 10.1109/AINA.2010.126
URL : https://hal.archives-ouvertes.fr/hal-00651582