1. Security Aspects for Rpl-Based Protocols: A Systematic Review in IoT;K Avila;Appl. Sci,2020
2. A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks;D Airehrour;Aust. J. Telecommun. Digit. Econ,2017
3. Intrusion detection systems for RPL security: A comparative analysis;G Simoglou;Comput. Secur
4. Routing for RPL (Routing Protocol for Low-Power and Lossy Networks) Leaves;M R P Thubert;Internet Eng. Task Force,1721