{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:03:26Z","timestamp":1730300606119,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T00:00:00Z","timestamp":1638835200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T00:00:00Z","timestamp":1638835200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,7]]},"DOI":"10.1109\/tencon54134.2021.9707411","type":"proceedings-article","created":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T20:41:43Z","timestamp":1645044103000},"page":"68-73","source":"Crossref","is-referenced-by-count":1,"title":["Mitigation Technique against Network Isolation Attack on RPL in 6LoWPAN Network"],"prefix":"10.1109","author":[{"given":"Abhay Deep","family":"Seth","sequence":"first","affiliation":[{"name":"Indian Institute of Technology,Department of EECS,Bhilai,India"}]},{"given":"Santosh","family":"Biswas","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology,Department of EECS,Bhilai,India"}]},{"given":"Amit Kumar","family":"Dhar","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology,Department of EECS,Bhilai,India"}]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2700261"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2011.6085374"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6206"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977476"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2878151"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2810379.2810386"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP49049.2020.9249519"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.6256248"},{"key":"ref16","first-page":"459","article-title":"A Taxonomy of Attacks in RPL-based Internet of Things","volume":"18","author":"mayzaud","year":"2016","journal-title":"International Journal of Network Security"},{"key":"ref17","first-page":"1","article-title":"Detection and verification of decreased rank attack using round-trip times in rpl-based 6lowpan net-works","author":"seth","year":"0","journal-title":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)"},{"key":"ref18","first-page":"95","article-title":"Imple-mentation of a wormhole attack against a rpl network: Challenges and effects","author":"perazzo","year":"0","journal-title":"2018 14th Annual Conference on Wireless On-demand Network Systems and Services (WONS)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2019.02.292"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2738629"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2019.8685628"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2874356"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7416"},{"key":"ref29","first-page":"90","article-title":"The ipv6 routing protocol for low-power and lossy networks (rpl) under network partitions","author":"paszkowska","year":"2018","journal-title":"Pro-ceedings of the 2018 International Conference on Embedded Wireless Systems and Networks ser EWSN ‘18"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2885894"},{"key":"ref8","article-title":"Transmission of IPv6 Packets over IEEE 802. 15. 4 Networks","author":"montenegro","year":"2007","journal-title":"RFC 4944"},{"journal-title":"IoT in five Days","year":"2016","author":"colina","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2855563"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2017.31"},{"key":"ref1","article-title":"RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks","author":"alexander","year":"2012","journal-title":"RFC 6550"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140344"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/794326"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2751617"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2606384"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.03.006"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2705290"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502897"}],"event":{"name":"TENCON 2021 - 2021 IEEE Region 10 Conference (TENCON)","start":{"date-parts":[[2021,12,7]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,10]]}},"container-title":["TENCON 2021 - 2021 IEEE Region 10 Conference (TENCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9707139\/9707180\/09707411.pdf?arnumber=9707411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T20:42:01Z","timestamp":1652733721000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9707411\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,7]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/tencon54134.2021.9707411","relation":{},"subject":[],"published":{"date-parts":[[2021,12,7]]}}}