Author:
Kareem Mohammed Aman,Tayeb Shahab
Publisher
Springer International Publishing
Reference28 articles.
1. Kharrufa, H., Al-Kashoash, H.A.A., Kemp, A.H.: RPL-based routing protocols in IoT applications: a review. IEEE Sens. J. 19, 5952–5967 (2019). https://doi.org/10.1109/JSEN.2019.2910881
2. Aris, A., Oktug, S.F., Yalcin, S.B.O.: RPL version number attacks: in-depth study. In: IEEE/IFIP Network Operations and Management Symposium, pp. 776–779 (2016). https://doi.org/10.1109/NOMS.2016.7502897
3. Mayzaud, A., Badonnel, R., Chrisme, I.: A taxonomy of attacks in RPL-based internet of things. Int. J. Netw. Secur. 18, 459–473 (2016)
4. Kim, H., Ko, J., Culler, D.E., Paek, J.: Challenging the IPv6 routing protocol for low-power and lossy networks (RPL): a survey. IEEE Commun. Surv. Tutor. 19(4), 2502–2525 (2017)
5. Hui, J., Vasseur, J.: The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams. Internet Requests for Comments (2012)