L. Abusalah, A. Khokhar, and M. Guizani, A survey of secure mobile Ad Hoc routing protocols, IEEE Communications Surveys & Tutorials, vol.10, issue.4, pp.78-93, 2008.
DOI : 10.1109/SURV.2008.080407

A. Barbir, S. Murphy, and Y. Yang, Generic Threats to Routing Protocols, RFC, vol.4593, 2006.
DOI : 10.17487/rfc4593

A. Brandt, E. Bacceli, R. Cragie, P. Van, and . Stok, Applicability Statement: The Use of the RPL Protocol Set in Home Automation and Building Control, 2014.

K. Chugh, L. Aboubaker, and J. Loo, Case study of a black hole attack on 6lowpan-RPL, Proceedings of the SECURWARE Conference, pp.157-162, 2012.

D. Djenouri, L. Khelladi, and A. N. Badache, A survey of security issues in mobile ad hoc and sensor networks, IEEE Communications Surveys & Tutorials, vol.7, issue.4, pp.2-28, 2005.
DOI : 10.1109/COMST.2005.1593277

J. R. Douceur, The Sybil Attack, First International Workshop on Peer-to-Peer Systems (IPTPS'01), pp.251-260, 2002.
DOI : 10.1007/3-540-45748-8_24

A. Dvir, T. Holczer, and L. Buttyán, VeRA - Version Number and Rank Authentication in RPL, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, pp.709-714, 2011.
DOI : 10.1109/MASS.2011.76

O. Gaddour and A. Koubâa, RPL in a nutshell: A survey, Computer Networks, vol.56, issue.14, pp.3163-3178, 2012.
DOI : 10.1016/j.comnet.2012.06.016

B. Guttman and E. A. Roback, An Introduction to Computer Security: The NIST Handbook, NIST Special Publication 800-12, NIST, 1995.
DOI : 10.6028/NIST.SP.800-12

J. Hui and J. Vasseur, The Routing Protocol for Low- Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams, Internet Engineering Task Force, 2012.
DOI : 10.17487/rfc6553

F. I. Khan, T. Shon, T. Lee, and K. Kim, Wormhole attack prevention mechanism for RPL based LLN network, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN), pp.149-154, 2013.
DOI : 10.1109/ICUFN.2013.6614801

K. D. Korte, A. Sehgal, and J. Schönwälder, A Study of the RPL Repair Process Using ContikiRPL, Proceedings of Dependable Networks and Services, pp.50-61, 2012.
DOI : 10.1007/978-3-642-30633-4_8

M. Landsmann, H. Perrey, O. Ugus, M. Wählisch, and T. C. Schmidt, Topology Authentication in RPL, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.73-74, 2013.
DOI : 10.1109/INFCOMW.2013.6970745

A. Le, J. Loo, A. Lasebae, M. Aiash, and Y. Luo, 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach, International Journal of Communication Systems, vol.4, issue.2005, pp.1189-1212, 2012.
DOI : 10.1002/dac.2356

A. Le, J. Loo, A. Lasebae, A. Vinel, Y. Chen et al., The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks, IEEE Sensors Journal, vol.13, issue.10, pp.3685-3692, 2013.
DOI : 10.1109/JSEN.2013.2266399

A. Le, J. Loo, Y. Luo, and A. Lasebae, Specification-based IDS for securing RPL from topology attacks, 2011 IFIP Wireless Days (WD), pp.1-3, 2011.
DOI : 10.1109/WD.2011.6098218

A. Le, J. Loo, Y. Luo, and A. Lasebae, The impacts of internal threats towards Routing Protocol for Low power and lossy network performance, 2013 IEEE Symposium on Computers and Communications (ISCC), pp.789-794, 2013.
DOI : 10.1109/ISCC.2013.6755045

P. Levis, T. Clausen, J. Hui, O. Gnawali, J. Ko-]-p et al., The Trickle Algorithm Internet Engineering Task Force Overview of Existing Routing Protocols for Low Power and Lossy Networks, Internet Engineering Task Force (IETF) Internet Draft: draft-ietf-roll-protocols-survey-07, 2009.

A. Mayzaud, R. Badonnel, and I. Chrisment, Monitoring and Security for the Internet of Things, Emerging Management Mechanisms for the Future Internet, pp.37-40, 2013.
DOI : 10.1007/978-3-642-38998-6_4

URL : https://hal.archives-ouvertes.fr/hal-00876216

A. Mayzaud, A. Sehgal, R. Badonnel, I. Chrisment, and J. Schönwälder, A Study of RPL DODAG Version Attacks, Monitoring and Securing Virtualized Networks and Services, pp.92-104, 2014.
DOI : 10.1007/978-3-662-43862-6_12

URL : https://hal.archives-ouvertes.fr/hal-01090993

A. Mayzaud, A. Sehgal, R. Badonnel, I. Chrisment, and J. Schönwälder, Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks, International Journal of Network Management, vol.13, issue.10, 2015.
DOI : 10.1002/nem.1898

URL : https://hal.archives-ouvertes.fr/hal-01207843

P. Pongle and G. Chavan, A survey: Attacks on RPL and 6LoWPAN in IoT, 2015 International Conference on Pervasive Computing (ICPC), pp.1-6, 2015.
DOI : 10.1109/PERVASIVE.2015.7087034

S. Raza, L. Wallgren, and T. Voigt, SVELTE: Real-time intrusion detection in the Internet of Things, Ad Hoc Networks, pp.2661-2674, 2013.
DOI : 10.1016/j.adhoc.2013.04.014

A. Rghiout, A. Khannous, and M. Bouhorma, Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions, Journal of Advanced Computer Science & Technology, vol.3, issue.2, pp.143-153, 2014.
DOI : 10.14419/jacst.v3i2.3321

A. Sehgal, A. Mayzaud, R. Badonnel, I. Chrisment, and J. Schönwälder, Addressing DODDAG inconsistency attacks in RPL networks, Proceedings of Global Information Infrastructure and Networking Symposium (GIIS'14), pp.1-8, 2014.

T. Tsao, R. Alexander, M. Dohler, V. Daza, M. Lozano et al., A Security Threat Analysis for Routing Protocol for Low-power and Lossy Networks (RPLs), RFC 7416, 2015.

L. Wallgren, S. Raza, and T. Voigt, Routing Attacks and Countermeasures in the RPL-Based Internet of Things, International Journal of Distributed Sensor Networks, vol.2, issue.8, pp.1-11, 2013.
DOI : 10.1109/ICC.2006.255595

Y. Wang, G. Attebury, and B. Ramamurthy, A survey of security issues in wireless sensor networks, IEEE Communications Surveys & Tutorials, vol.8, issue.2, pp.2-23, 2006.
DOI : 10.1109/COMST.2006.315852

K. Weekly and K. S. Pister, Evaluating sinkhole defense techniques in RPL networks, 2012 20th IEEE International Conference on Network Protocols (ICNP), pp.1-6, 2012.
DOI : 10.1109/ICNP.2012.6459948

T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey et al., RPL: IPv6 routing protocol for lowpower and lossy networks, 2012.

W. Xie, M. Goyal, H. Hosseini, J. Martocci, Y. Bashir et al., Routing Loops in DAG-Based Low Power and Lossy Networks, 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp.888-895, 2010.
DOI : 10.1109/AINA.2010.126

URL : https://hal.archives-ouvertes.fr/hal-00651582