{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T17:33:12Z","timestamp":1767979992858,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662438619","type":"print"},{"value":"9783662438626","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43862-6_12","type":"book-chapter","created":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T23:51:34Z","timestamp":1403653894000},"page":"92-104","source":"Crossref","is-referenced-by-count":56,"title":["A Study of RPL DODAG Version Attacks"],"prefix":"10.1007","author":[{"given":"Anth\u00e9a","family":"Mayzaud","sequence":"first","affiliation":[]},{"given":"Anuj","family":"Sehgal","sequence":"additional","affiliation":[]},{"given":"R\u00e9mi","family":"Badonnel","sequence":"additional","affiliation":[]},{"given":"Isabelle","family":"Chrisment","sequence":"additional","affiliation":[]},{"given":"J\u00fcrgen","family":"Sch\u00f6nw\u00e4lder","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J., Alexander, R.: RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. IETF RFC 6550 (March 2012)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Seeber, S., Sehgal, A., Stelte, B., Rodosek, G.D., Sch\u00f6nw\u00e4lder, J.: Towards A Trust Computing Architecture for RPL in Cyber Physical Systems. In: IFIP\/IEEE International Conference on Network and Service Management (CNSM), Z\u00fcrich, Switzerland (October 2013)","DOI":"10.1109\/CNSM.2013.6727823"},{"issue":"12","key":"12_CR3","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/MCOM.2012.6384464","volume":"50","author":"A. Sehgal","year":"2012","unstructured":"Sehgal, A., Perelman, V., Kuryla, S., Sch\u00f6nw\u00e4lder, J.: Management of Resource Constrained Devices in the Internet of Things. IEEE Communications Magazine\u00a050(12), 144\u2013149 (2012)","journal-title":"IEEE Communications Magazine"},{"key":"12_CR4","unstructured":"Dunkels, A., Gronvall, B., Voigt, T.: Contiki - a Lightweight and Flexible Operating System for Tiny Networked Sensors. In: 29th Annual IEEE International Conference on Local Computer Networks (LCN), Tampa, FL (November 2004)"},{"key":"12_CR5","unstructured":"Ko, J., Dawson-Haggerty, S., Gnawali, O., Culler, D., Terzis, A.: Evaluating the Performance of RPL and 6LoWPAN in TinyOS. In: Workshop on Extending the Internet to Low Power and Lossy Networks (IP+SN), Chicago, IL (April 2011)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Baccelli, E., Hahm, O., G\u00fcnes, M., W\u00e4hlisch, M., Schmidt, T.C.: RIOT OS: Towards an OS for the Internet of Things. In: 32nd IEEE INFOCOM Poster Session, Turin, Italy (April 2013)","DOI":"10.1109\/INFCOMW.2013.6970748"},{"key":"12_CR7","unstructured":"Cheneau, T.: SimpleRPL (February 2014), \n                    \n                      https:\/\/github.com\/tcheneau\/simpleRPL"},{"key":"12_CR8","unstructured":"Tsao, T., Alexander, R., Dohler, M., Daza, V., Lozano, A., Richardson, M.: A Security Threat Analysis for Routing Protocol for Low-power and Lossy Networks (RPL). IETF Internet Draft <draft-ietf-roll-security-threats-06> (December 2013)"},{"key":"12_CR9","unstructured":"Chugh, K., Aboubaker, L., Loo, J.: Case Study of a Black Hole Attack on LoWPAN-RPL. In: Proc. of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), Rome, Italy, pp. 157\u2013162 (August 2012)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Weekly, K., Pister, K.: Evaluating Sinkhole Defense Techniques in RPL Networks. In: 20th IEEE International Conference on Network Protocols (ICNP), Austin, TX, pp. 1\u20136 (November 2012)","DOI":"10.1109\/ICNP.2012.6459948"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Wallgren, L., Raza, S., Voigt, T.: Routing Attacks and Countermeasures in the RPL-Based Internet of Things. International Journal of Distributed Sensor Networks\u00a013(794326) (2013)","DOI":"10.1155\/2013\/794326"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Landsmann, M., Perrey, H., Ugus, O., W\u00e4hlisch, M., Schmidt, T.: Topology Authentication in RPL. In: 32nd IEEE INFOCOM Poster Session, Turin, Italy (April 2013)","DOI":"10.1109\/INFCOMW.2013.6970745"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Dvir, A., Holczer, T., Buttyan, L.: VeRA - Version Number and Rank Authentication in RPL. In: 8th IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), Hangzhou, China, pp. 709\u2013714 (October 2011)","DOI":"10.1109\/MASS.2011.76"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Perrey, H., Landsmann, M., Ugus, O., W\u00e4hlisch, M., Schmidt, T.: TRAIL: Topology Authentication in RPL. arXiv preprint arXiv:1312.0984 (2013)","DOI":"10.1109\/INFCOMW.2013.6970745"},{"key":"12_CR15","unstructured":"Levis, P.A., Patel, N., Culler, D., Shenker, S.: Trickle: A Self Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks. In: 1st Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA (March 2004)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Hui, J., Vasseur, J.: The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams. IETF RFC 6553 (March 2012)","DOI":"10.17487\/rfc6553"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-642-30633-4_8","volume-title":"Dependable Networks and Services","author":"K.D. Korte","year":"2012","unstructured":"Korte, K.D., Sehgal, A., Sch\u00f6nw\u00e4lder, J.: A Study of the RPL Repair Process Using ContikiRPL. In: Sadre, R., Novotn\u00fd, J., \u010celeda, P., Waldburger, M., Stiller, B. (eds.) AIMS 2012. LNCS, vol.\u00a07279, pp. 50\u201361. Springer, Heidelberg (2012)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: Cross-Level Sensor Network Simulation with COOJA. In: 31st IEEE Conference on Local Computer Networks (LCN), Tampa, FL, pp. 641\u2013648 (November 2006)","DOI":"10.1109\/LCN.2006.322172"}],"container-title":["Lecture Notes in Computer Science","Monitoring and Securing Virtualized Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43862-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T00:24:43Z","timestamp":1558916683000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43862-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662438619","9783662438626"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43862-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}