Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Routing Attacks and Countermeasures in the RPL-Based Internet of Things
by
Raza, Shahid
, Wallgren, Linus
, Voigt, Thiemo
in
Attacks
/ Computer information security
/ Computer networks
/ Constraints
/ Devices
/ Internet
/ Internet of Things
/ Networks
/ Routing
/ Routing (telecommunications)
/ RPL
/ Security
2013
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Routing Attacks and Countermeasures in the RPL-Based Internet of Things
by
Raza, Shahid
, Wallgren, Linus
, Voigt, Thiemo
in
Attacks
/ Computer information security
/ Computer networks
/ Constraints
/ Devices
/ Internet
/ Internet of Things
/ Networks
/ Routing
/ Routing (telecommunications)
/ RPL
/ Security
2013
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Routing Attacks and Countermeasures in the RPL-Based Internet of Things
by
Raza, Shahid
, Wallgren, Linus
, Voigt, Thiemo
in
Attacks
/ Computer information security
/ Computer networks
/ Constraints
/ Devices
/ Internet
/ Internet of Things
/ Networks
/ Routing
/ Routing (telecommunications)
/ RPL
/ Security
2013
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Routing Attacks and Countermeasures in the RPL-Based Internet of Things
Journal Article
Routing Attacks and Countermeasures in the RPL-Based Internet of Things
2013
Request Book From Autostore
and Choose the Collection Method
Overview
The Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol standardized for constrained environments such as 6LoWPAN networks. Providing security in IPv6/RPL connected 6LoWPANs is challenging because the devices are connected to the untrusted Internet and are resource constrained, the communication links are lossy, and the devices use a set of novel IoT technologies such as RPL, 6LoWPAN, and CoAP/CoAPs. In this paper we provide a comprehensive analysis of IoT technologies and their new security capabilities that can be exploited by attackers or IDSs. One of the major contributions in this paper is our implementation and demonstration of well-known routing attacks against 6LoWPAN networks running RPL as a routing protocol. We implement these attacks in the RPL implementation in the Contiki operating system and demonstrate these attacks in the Cooja simulator. Furthermore, we highlight novel security features in the IPv6 protocol and exemplify the use of these features for intrusion detection in the IoT by implementing a lightweight heartbeat protocol.
Publisher
Hindawi Puplishing Corporation,SAGE Publications,Wiley
Subject
MBRLCatalogueRelatedBooks
Related Items
Related Items
This website uses cookies to ensure you get the best experience on our website.