[1] ZHANG Yuqing,ZHOU Wei,PENG Anni.Survey of Internet of things security[J].Journal of Computer Research and Development,2017,54(10):2130-2143.(in Chinese) 张玉清,周威,彭安妮.物联网安全综述[J].计算机研究与发展,2017,54(10):2130-2143. [2] BRANDT A,HUI J,KELSEY R,et al.RPL:IPv6 routing protocol for low-power and lossy networks:RFC 6550[S].Fremont,USA:IETF,2012. [3] KALYANI S,VYDEKI D.Survey of rank attack detection algorithms in Internet of things[C]//Proceedings of 2018 International Conference on Advances in Computing,Communications and Informatics.Washington D.C.,USA:IEEE Press,2018: 2136-2141. [4] REHMAN A,KHAN M M,LODHI M A,et al.Rank attack using objective function in RPL for low power and lossy networks[C]//Proceedings of 2016 International Conference on Industrial Informatics and Computer Systems.Washington D.C.,USA:IEEE Press,2016:1-10. [5] LE A,LOO J,LASEBAE A,et al.The impact of rank attack on network topology of routing protocol for low-power and lossy networks[J].IEEE Sensors Journal,2013,13(10):3685-3692. [6] ZHU Lin,GAO Deyun,LUO Hongbin.Research of RPL protocol of wireless sensor network[J].Computer Technology and Development,2012,22(8):1-4.(in Chinese) 朱琳,高德云,罗洪斌.无线传感器网络的RPL路由协议研究[J].计算机技术与发展,2012,22(8):1-4. [7] YU Ke,WANG Huifeng.Study and improvement of RPL routing protocol[J].Computer Engineering,2018,44(3):103-108.(in Chinese) 俞柯,王慧锋.RPL路由协议的研究与改进[J].计算机工程,2018,44(3):103-108. [8] LEVIS P,CLAUSEN T,HUI J,et al.The Trickle algorithm: RFC 6206[S].Fremont,USA:IETF,2011. [9] MAYZAUD A,BADONNEL R,CHRISMENT I.A taxonomy of attacks in RPL-based Internet of things[J].International Journal of Network Security,2016,18(3):459-473. [10] WALLGREN L,RAZA S,VOIGT T.Routing attacks and countermeasures in the RPL-based Internet of things[J].International Journal of Distributed Sensor Networks,2013,9(8):1-11. [11] WEEKLY K,PISTER K.Evaluating sinkhole defense techniques in RPL networks[C]//Proceedings of the 20th IEEE International Conference on Network Protocols.Washington D.C.,USA:IEEE Press,2012: 1-6. [12] DVIR A,HOLCZER T,BUTTYAN L.VeRA—version number and rank authentication in RPL[C]//Proceedings of the 8th International Conference on Mobile Ad-Hoc and Sensor Systems.Washington D.C.,USA:IEEE Press,2011: 709-714. [13] SEHGAL A,MAYZAUD A,BADONNEL R,et al.Addressing DODAG inconsistency attacks in RPL networks[C]//Proceedings of 2014 Global Information Infrastructure and Networking Symposium.Washington D.C.,USA:IEEE Press,2014:15-19. [14] THUBERT P.Objective function zero for the Routing Protocol for Low-power and lossy networks(RPL): RFC 6552[S].Fremont,USA:IETF,2012. [15] RAZA S,WALLGREN L,VOIGT T.SVELTE:real-time intrusion detection in the Internet of things[J].Ad Hoc Networks,2013,11(8):2661-2674. [16] PERREY H,LANDSMANN M,UGUS O,et al.TRAIL:topology authentication in RPL[C]//Proceedings of 2016 International Conference on Embedded Wireless Systems and Networks.New York,USA:ACM Press,2013:59-64. [17] IUCHI K,MATSUNAGA T,TOYODA K,et al.Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network[C]//Proceedings of the 21st Asia-Pacific Conference on Communications.Washington D.C.,USA:IEEE Press,2015:14-24. [18] AIREHROUR D,GUTIERREZ J A,RAY S K.SecTrust-RPL:a secure trust-aware RPL routing protocol for Internet of things[J].Future Generation Computer Systems,2019,93:860-876. [19] ESCHENAUER L,GLIGOR V D,BARAsS J.On trust establishment in mobile ad-hoc networks[C]//Proceedings of International Workshop on Security Protocols.Berlin,Germany:Springer,2004:47-66. [20] LUO Junhai,LIU Xue,FAN Mingyu.A trust model based on fuzzy recommendation for mobile ad-hoc networks[J].Computer Networks,2009,53(14):2396-2407. [21] GANERIWAL S,BALZANO L K,SRIVASTAVA M B.Reputation-based framework for high integrity sensor networks[J].ACM Transactions on Sensor Networks,2008,4(3):1-37. |