|
[1]ZigBee IP Webinar presentation. Retrieved: Aug. 2015. Available: https://docs.zigbee.org/zigbee-docs/dcn/13/docs-13-0158-00-0mwg-the-new-zigbee-ip-specification-ipv6-control-for-low-power-low-cost-devices-webinar.pdf [2]S. E. Deering, "Internet protocol, version 6 (IPv6) specification," 1998. [3]TrendLabs 2013年資訊安全總評. Retrieved: Aug. 2015. Available: http://www.trendmicro.tw/cloud-content/tw/pdfs/about/2013_review.pdf [4]C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad hoc networks, vol. 1, pp. 293-315, 2003. [5]X. Chen, K. Makki, K. Yen, and N. Pissinou, "Sensor network security: a survey," Communications Surveys & Tutorials, IEEE, vol. 11, pp. 52-73, 2009. [6]I. Butun, S. Morgera, and R. Sankar, "A Survey of Intrusion Detection Systems in Wireless Sensor Networks," 2014. [7]C. E. Caicedo, J. B. Joshi, and S. R. Tuladhar, "IPv6 Security Challenges," IEEE Computer, vol. 42, pp. 36-42, 2009. [8]F. Barani, "A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system," in Intelligent Systems (ICIS), 2014 Iranian Conference on, 2014, pp. 1-6. [9]G. Mulligan, "The 6LoWPAN architecture," in Proceedings of the 4th workshop on Embedded networked sensors, 2007, pp. 78-82. [10]X. Ma and W. Luo, "The analysis of 6LoWPAN technology," in 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008, pp. 963-966. [11]T. Winter, "RPL: IPv6 routing protocol for low-power and lossy networks," RFC 6550, 2012. [12]J. Vasseur, "Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks," RFC 6551, 2012. [13]P. Thubert, "Objective function zero for the routing protocol for low-power and lossy networks (RPL)," 2012. [14]B. Warneke, M. Last, B. Liebowitz, and K. S. J. Pister, "Smart Dust: communicating with a cubic-millimeter computer," Computer, vol. 34, pp. 44-51, 2001. [15]I. F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," Communications Magazine, IEEE, vol. 40, pp. 102-114, 2002. [16]Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. Mccann, and K. Leung, "A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities," Wireless Communications, IEEE, vol. 20, pp. 91-98, 2013. [17]L. Wallgren, S. Raza, and T. Voigt, "Routing Attacks and Countermeasures in the RPL-Based Internet of Things," International Journal of Distributed Sensor Networks, vol. 2013, p. 11, 2013. [18]T. I. C. W. Attacks, "A Full Image of the Wormhole Attacks," 2009. [19]H. Yih-Chun, A. Perrig, and D. B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, 2003, pp. 1976-1986 vol.3. [20]I. Khalil, S. Bagchi, and N. B. Shroff, "LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks," in Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on, 2005, pp. 612-621. [21]I. Khalil, S. Bagchi, and N. B. Shroff, "MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks," Ad Hoc Networks, vol. 6, pp. 344-362, 2008. [22]C. Sun, K. Doo-Young, L. Do-hyeon, and J. Jae-il, "WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks," in Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC ''08. IEEE International Conference on, 2008, pp. 343-348. [23]G. Lee, J. Seo, and D.-k. Kim, "An approach to mitigate wormhole attack in wireless ad hoc networks," in Information Security and Assurance, 2008. ISA 2008. International Conference on, 2008, pp. 220-225. [24]E. Rescorla, "Diffie-Hellman key agreement method," 1999. [25]F. Khan, T. Shon, T. Lee, and K. Kim, "Wormhole attack prevention mechanism for RPL based LLN network," in Ubiquitous and Future Networks (ICUFN), 2013 Fifth International Conference on, 2013, pp. 149-154. [26]T. Reusing, "Comparison of operating systems tinyos and contiki," Sens. Nodes-Operation, Netw. Appli.(SN), vol. 7, 2012. [27]M. Junker, R. Hoch, and A. Dengel, "On the evaluation of document analysis components by recall, precision, and accuracy," in Document Analysis and Recognition, 1999. ICDAR''99. Proceedings of the Fifth International Conference on, 1999, pp. 713-716. [28]M. M. van de Kamp, "Statistical analysis of rain fade slope," Antennas and Propagation, IEEE Transactions on, vol. 51, pp. 1750-1759, 2003. [29]Rain fade - Wikipedia. Retrieved: Aug. 2015. Available: https://en.wikipedia.org/wiki/Rain_fade
|