Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?
暂无分享,去创建一个
Cristina Alcaraz | Rodrigo Roman | Pablo Najera | Javier Lopez | R. Román | Javier López | Pablo Najera | Cristina Alcaraz
[1] Hannes Tschofenig,et al. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS) , 2005, RFC.
[2] Rodrigo Roman,et al. Integrating wireless sensor networks and the internet: a security analysis , 2009, Internet Res..
[3] Christoph P. Mayer. Electronic Communications of the EASST Volume 17 ( 2009 ) Workshops der Wissenschaftlichen Konferenz Kommunikation in Verteilten Systemen 2009 ( WowKiVS 2009 ) Security and Privacy Challenges in the Internet of Things , 2008 .
[4] Vlad Trifa,et al. Sharing using social networks in a composable Web of Things , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[5] L. Toledo-Pereyra. Trust , 2006, Mediation Behaviour.
[6] Félix Gómez Mármol,et al. Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems , 2010, Comput. Stand. Interfaces.
[7] Paulo S. L. M. Barreto,et al. A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.
[8] Felix C. Freiling,et al. Intrusion Detection in Wireless Sensor Networks , 2009 .
[9] Suman Nath,et al. SenseWeb: An Infrastructure for Shared Sensing , 2007, IEEE MultiMedia.
[10] Yang Xiao,et al. Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.
[11] M. Krishnan. Intrusion Detection in Wireless Sensor Networks , 2006 .
[12] Azzedine Boukerche,et al. A Taxonomy of Secure Time Synchronization Algorithms for Wireless Sensor Networks , 2008, Algorithms and Protocols for Wireless Sensor Networks.
[13] Firdous Kausar,et al. A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment , 2009, ISA.
[14] Mark Stamp,et al. Handbook of Information and Communication Security , 2010, Handbook of Information and Communication Security.
[15] Ralf Steinmetz,et al. Wireless Sensor Networks and the Internet of Things: Selected Challenges , 2009 .
[16] Cristina Alcaraz,et al. Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.
[17] Matt Welsh,et al. Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.
[18] Lejla Batina,et al. Compact Public-Key Implementations for RFID and Sensor Nodes , 2010, Secure Integrated Circuits and Systems.
[19] Mike Smith. Web-based monitoring & control for oil/gas industry , 2001 .
[20] C. Chandrasekar,et al. Secure Routing In Wireless Sensor Networks , 2010 .
[21] Gianluca Misuraca,et al. Futuring e-government: governance and policy implications for designing an ICT-enabled knowledge society , 2009, ICEGOV '09.
[22] David E. Culler,et al. Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.
[23] Gabriel Montenegro,et al. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.
[24] Saurabh Bagchi,et al. Optimizing AES for embedded devices and wireless sensor networks , 2008, TRIDENTCOM.
[25] George W. Irwin,et al. An Overview of Wireless Networks in Control and Monitoring , 2006, ICIC.
[26] Syed Obaid Amin,et al. A novel Intrusion Detection Framework for IP-based sensor networks , 2009, 2009 International Conference on Information Networking.
[27] Srdjan Toljagic. IBM: A Smarter Planet , 2011 .