{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:23:30Z","timestamp":1761578610426,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/cnsm.2016.7818408","type":"proceedings-article","created":{"date-parts":[[2017,1,19]],"date-time":"2017-01-19T21:04:39Z","timestamp":1484859879000},"page":"127-135","source":"Crossref","is-referenced-by-count":26,"title":["Detecting version number attacks in RPL-based networks using a distributed monitoring architecture"],"prefix":"10.1109","author":[{"given":"Anthea","family":"Mayzaud","sequence":"first","affiliation":[]},{"given":"Remi","family":"Badonnel","sequence":"additional","affiliation":[]},{"given":"Isabelle","family":"Chrisment","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2011.6098218"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502833"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7228"},{"year":"0","key":"ref14","article-title":"Cooja, the Contiki Network Simulator"},{"year":"0","key":"ref15","article-title":"IBM ILOG CPLEX Optimization Studio"},{"year":"0","key":"ref16","article-title":"A Mathematical Programming Language (AMPL)"},{"key":"ref17","first-page":"459","article-title":"A Taxonomy of Attacks in RPL-based Internet of Things","volume":"18","author":"mayzaud","year":"2016","journal-title":"International Journal of Network Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6550"},{"key":"ref3","article-title":"Management of Networks with Constrained Devices: Use Cases","author":"ersue","year":"2014","journal-title":"IETF Internet Draft"},{"key":"ref6","article-title":"RPL Version Number Attacks: In-dept Study","author":"ahmet","year":"2016","journal-title":"Proc IEEE\/IFIP Network Operations and Management Symp"},{"key":"ref5","article-title":"A Study of RPL DODAG Version Attacks","author":"mayzaud","year":"2014","journal-title":"Proceedings of the AIMS conference"},{"key":"ref8","article-title":"TRAIL: Topology Authentication in RPL","author":"perrey","year":"2013","journal-title":"Tech Rep"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2011.76"},{"key":"ref2","article-title":"Applicability Statement: The Use of the Routing Protocol for Low-Power and Lossy Networks (RPL) Protocol Suite in Home Automation and Building Control","author":"baccelli","year":"2016","journal-title":"RFC 7733"},{"key":"ref1","article-title":"Applicability Statement for the Routing Protocol for Low Power and Lossy Networks (RPL) in AMI Networks","author":"popa","year":"2016","journal-title":"Internet Engineering Task Force Internet-Draft draft-ietf-roll-applicability-ami-13"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970745"}],"event":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2016,10,31]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2016,11,4]]}},"container-title":["2016 12th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7803495\/7818378\/07818408.pdf?arnumber=7818408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T15:37:28Z","timestamp":1513179448000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7818408\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cnsm.2016.7818408","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}