The Internet of Things: A survey, Computer Networks, vol.54, issue.15, pp.2787-2805, 2010. ,
The Evolution of MAC Protocols in Wireless Sensor Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.15, pp.101-120, 2013. ,
Reliability through frequency diversity: why channel hopping makes sense, PE-WASUN, pp.116-123, 2009. ,
Industrial Internet: A Survey on the Enabling Technologies, Applications, and Challenges, IEEE Communications Surveys Tutorials, vol.19, pp.1504-1526, 2017. ,
Security for the internet of things: A survey of existing protocols and open research issues, IEEE Communications Surveys & Tutorials, vol.17, pp.1294-1312, 2015. ,
A survey on energy-aware security mechanisms, Pervasive and Mobile Computing, vol.24, pp.77-90, 2015. ,
Conservation of Energy in Wireless Sensor Network by Preventing Denial of Sleep Attack, International Conference on Advanced Computing Technologies and Applications (ICACTA), vol.45, pp.370-379, 2015. ,
A Survey on Prevention Approaches for Denial of Sleep Attacks in Wireless Networks, Journal of Emerging Technologies in Web Intelligence, vol.6, pp.106-110, 2014. ,
Energy Life-Time of Wireless Nodes with Network Attacks and Mitigation, IEEE International Conference on Communications Workshops (ICC Workshops), pp.1-6, 2018. ,
Low energy operation in WSNs: A survey of preamble sampling MAC protocols, Computer Networks, vol.55, issue.15, pp.3351-3363, 2011. ,
The ContikiMAC Radio Duty Cycling Protocol, 2011. ,
Countering Three Denial-ofSleep Attacks on ContikiMAC, International Conference on Embedded Wireless Systems and Networks (EWSN), pp.108-119, 2017. ,
Mitigation of Replay Attack In Wireless Sensor Network, International Journal on Information Technology, vol.5, 2014. ,
Denial-of-sleep defenses for IEEE 802.15.4 coordinated sampled listening (CSL), Computer Networks, vol.148, pp.60-71, 2019. ,
Radio-triggered wake-up for wireless sensor networks, International Journal of Time-Critical Computing Systems (Real-Time Systems), vol.29, issue.2, pp.157-182, 2005. ,
Counteracting Denial-of-Sleep Attacks in Wake-Up-Radio-Based Sensing Systems, 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp.1-9, 2016. ,
A survey: energy exhausting attacks in MAC protocols in WBANs, Telecommunication Systems, vol.58, pp.153-164, 2015. ,
Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols, IEEE Transactions on Vehicular Technology, vol.58, pp.367-380, 2009. ,
GTS Attack : An IEEE 802.15.4 MAC Layer Attack in Wireless Sensor Networks, International Journal On Advances in Internet Technology, vol.2, issue.1, 2009. ,
MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks, EURASIP Journal on Wireless Communications and Networking, p.93830, 2006. ,
Ghostin-zigbee: Energy depletion attack on zigbee-based wireless networks, IEEE Internet of Things Journal, vol.3, pp.816-829, 2016. ,
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks, Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp.46-57, 2005. ,
An Energy-Efficient MAC Protocol for Wireless Sensor Networks, 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), vol.3, pp.1567-1576, 2002. ,
, Low-Rate Wireless Personal Area Networks (LR-WPANs), tech. rep, 2016.
6TiSCH: IPv6 over the TSCH mode of IEEE 802.15.4e, IETF working group ,
Scheduling for IEEE802.15.4-TSCH and slow channel hopping MAC in low power industrial wireless networks: A survey, Elsevier Computer Communications, vol.114, pp.84-105, 2017. ,
Simulating 6TiSCH Networks, Wiley Transactions on Emerging Telecommunications (ETT), 2018. ,
, , 2018.