{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T19:07:41Z","timestamp":1746126461802,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.23919\/apsipa.2018.8659504","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T23:11:49Z","timestamp":1552950709000},"page":"1194-1199","source":"Crossref","is-referenced-by-count":13,"title":["A Root-based Defense Mechanism Against RPL Blackhole Attacks in Internet of Things Networks"],"prefix":"10.23919","author":[{"given":"Jun","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Yuhong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Behnam","family":"Dezfouli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2012.6459948"},{"journal-title":"A Performance Evaluation of RPL in Contiki","year":"2012","author":"ali","key":"ref11"},{"journal-title":"A Performance Study of RPL with Trickle Algorithm Variants","year":"2016","author":"benson","key":"ref12"},{"key":"ref13","article-title":"Computer Networking for LANS to WANS: Hardware","author":"mansfield","year":"2010","journal-title":"Software and Security Course Technology Cengage Learning"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7733"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6550"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2356"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"ref5","first-page":"157","article-title":"Case study of a black hole attack on LoWPAN-RPL","author":"chugh","year":"2012","journal-title":"Proc of the Sixth International Conference on Emerging Security Information Systems and Technologies (SECURWARE)"},{"key":"ref8","first-page":"459","article-title":"A Taxonomy of Attacks in RPL-based Internet of Things","volume":"18","author":"mayzaud","year":"2016","journal-title":"International Journal of Network Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2016.7878793"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1194-2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref9","article-title":"A security threat analysis for the routing protocol for low-power and lossy networks (rpls)","author":"alexander","year":"2015","journal-title":"IETF Internet Draft (draft-ietf-roll-security-threats-06)"}],"event":{"name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","start":{"date-parts":[[2018,11,12]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2018,11,15]]}},"container-title":["2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8648538\/8659446\/08659504.pdf?arnumber=8659504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T03:35:30Z","timestamp":1598240130000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8659504\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":14,"URL":"https:\/\/doi.org\/10.23919\/apsipa.2018.8659504","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}