Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey
暂无分享,去创建一个
[1] Levente Buttyán,et al. VeRA - Version Number and Rank Authentication in RPL , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.
[2] Markus Eurich,et al. The SENSEI project: integrating the physical world with the digital world of the network of the future , 2009 .
[3] Lossy Networks. Stability Analysis of the Delays of the Routing Protocol over Low Power and , 2010 .
[4] Michele Zorzi,et al. An integrated system for secure code distribution in Wireless Sensor Networks , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[5] Thiemo Voigt,et al. 6LoWPAN Compressed DTLS for CoAP , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.
[6] Vlad Trifa,et al. Towards the Web of Things: Web Mashups for Embedded Devices , 2009 .
[7] Thomas Narten,et al. Neighbor Discovery for IP Version 6 (IPv6) , 1996, RFC.
[8] HyunGon Kim,et al. Protection Against Packet Fragmentation Attacks at 6LoWPAN Adaptation Layer , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.
[9] Rodrigo Roman,et al. Integrating wireless sensor networks and the internet: a security analysis , 2009, Internet Res..
[10] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[11] Erik Wilde,et al. A resource oriented architecture for the Web of Things , 2010, 2010 Internet of Things (IOT).
[12] Hannes Tschofenig,et al. Internet Engineering Task Force (ietf) Using Raw Public Keys in Transport Layer Security (tls) and Datagram Transport Layer Security (dtls) , 2022 .
[13] Sandeep Kumar,et al. Profiling of DTLS for CoAP-based IoT Applications , 2013 .
[14] Qin,et al. [IEEE 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC) (Co-Located with CSE 2010) - Hong Kong, China (2010.12.11-2010.12.13)] 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - IOT Gateway: BridgingWireless Sensor Networks into Intern , 2010 .
[15] Hanno Wirtz,et al. 6LoWPAN fragmentation attacks and mitigation mechanisms , 2013, WiSec '13.
[16] Utz Roedig,et al. Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN , 2014, Secur. Commun. Networks.
[17] Óscar García-Morchón,et al. End-to-End Transport Security in the IP-Based Internet of Things , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).
[18] Ki-Hyung Kim,et al. IPv6 over Low Power WPAN Security Analysis , 2011 .
[19] Young-Joo Kim,et al. SSL-Based Lightweight Security of IP-Based Wireless Sensor Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.
[20] Tim Winter,et al. Routing Requirements for Urban Low-Power and Lossy Networks , 2009, RFC.
[21] S. Kim,et al. Trio: enabling sustainable and scalable outdoor wireless sensor network deployments , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[22] Rabia Riaz,et al. Security analysis survey and framework design for IP connected LoWPANs , 2009, 2009 International Symposium on Autonomous Decentralized Systems.
[23] M. Shamim Hossain,et al. A Survey on Sensor-Cloud: Architecture, Applications, and Approaches , 2013, Int. J. Distributed Sens. Networks.
[24] Mischa Dohler,et al. A Security Framework for Routing over Low Power and Lossy Networks , 2012 .
[25] Jakob Buron,et al. Home Automation Routing Requirements in Low-Power and Lossy Networks , 2008, RFC.
[26] S. Besen. THE EUROPEAN TELECOMMUNICATIONS STANDARDS INSTITUTE: A PRELIMINARY ANALYSIS , 1990 .
[27] David E. Culler,et al. Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[28] Emiliano De Cristofaro,et al. FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks , 2009, WiSec '09.
[29] Serge Fdida,et al. Future internet research and experimentation: the FIRE initiative , 2007, CCRV.
[30] Pekka Nikander,et al. SEcure Neighbor Discovery (SEND) , 2005, RFC.
[31] Eric Rescorla,et al. Extensions for Datagram Transport Layer Security (TLS) in Low Bandwidth Environments , 2006 .
[32] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[33] Basavaraj Patil,et al. Transmission of IPv6 Packets over BLUETOOTH Low Energy , 2013 .
[34] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[35] Vlad Trifa,et al. Towards physical mashups in the Web of Things , 2009, 2009 Sixth International Conference on Networked Sensing Systems (INSS).
[36] Mihaela Cardei,et al. IEEE 802.15.4: Low Rate Wireless Personal Area Networks (PANs) , 2008, Encyclopedia of Wireless and Mobile Communications.
[37] Tuomas Aura,et al. Cryptographically Generated Addresses (CGA) , 2005, ISC.
[38] T. Braun,et al. TCP support for sensor networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.
[39] Jean-Philippe Vasseur,et al. Design and Application Spaces for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) , 2012, RFC.
[40] Adam Dunkels,et al. Efficient application integration in IP-based sensor networks , 2009, BuildSys '09.
[41] Carsten Bormann,et al. CoAP: An Application Protocol for Billions of Tiny Internet Nodes , 2012, IEEE Internet Computing.
[42] Jorge Sá Silva,et al. End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication , 2013, 2013 IFIP Networking Conference.
[43] David E. Culler,et al. Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.
[44] Rachid Beghdad,et al. Securing Wireless Sensor Networks: A Survey , 2013, EDPACS.
[45] Mohamed F. Younis,et al. Intelligent Gateways Placement for Reduced Data Latency in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[46] Thiemo Voigt,et al. Lightweight IKEv2: A Key Management Solution for both Compressed IPsec and IEEE 802.15.4 Security , 2012 .
[47] LeAnhtuan,et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012 .
[48] Paulo S. L. M. Barreto,et al. A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.
[49] Kyung Sup Kwak,et al. An overview of IEEE 802.15.6 standard , 2010, 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010).
[50] Dominique Barthel,et al. Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks , 2012, RFC.
[51] Zach Shelby,et al. CoAP Security Options , 2011 .
[52] Gang Gan,et al. Internet of Things Security Analysis , 2011, 2011 International Conference on Internet Technology and Applications.
[53] Gabriel Montenegro,et al. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.
[54] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[55] Suman Nath,et al. SenseWeb: An Infrastructure for Shared Sensing , 2007, IEEE MultiMedia.
[56] Ignas G. Niemegeers,et al. IEEE 802.11ah: Advantages in standards and further challenges for sub 1 GHz Wi-Fi , 2012, 2012 IEEE International Conference on Communications (ICC).
[57] Marimuthu Palaniswami,et al. Secure Rateless Deluge: Pollution-Resistant Reprogramming and Data Dissemination for Wireless Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..
[58] Siarhei Kuryla,et al. RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .
[59] Jonathan Loo,et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..
[60] Jari Arkko,et al. End-to-end security for sleepy smart object networks , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.
[61] Guifen Gu,et al. The survey of GSM wireless communication system , 2010, 2010 International Conference on Computer and Information Application.
[62] S. Chia. The Universal Mobile Telecommunication System , 1992, IEEE Communications Magazine.
[63] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[64] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[65] Klaus Hartke,et al. Practical Issues with Datagram Transport Layer Security in Constrained Environments , 2014 .
[66] Gilles Grimaud,et al. The Web of Things: Interconnecting Devices with High Usability and Performance , 2009, 2009 International Conference on Embedded Software and Systems.
[67] Zach Shelby,et al. Transmission of IPv6 Packets over DECT Ultra Low Energy , 2013 .
[68] Syed Obaid Amin,et al. A novel Intrusion Detection Framework for IP-based sensor networks , 2009, 2009 International Conference on Information Networking.
[69] Roberto Di Pietro,et al. Mobility and Cooperation to Thwart Node Capture Attacks in MANETs , 2009, EURASIP J. Wirel. Commun. Netw..
[70] Eric Anderson,et al. X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks , 2006, SenSys '06.
[71] Carsten Bormann,et al. Using CoAP with IPsec , 2012 .
[72] Carsten Bormann,et al. Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) , 2012, RFC.
[73] Jorge Sá Silva,et al. Network‐layer security for the Internet of Things using TinyOS and BLIP , 2014, Int. J. Commun. Syst..
[74] Xiaoran Jiang,et al. TCP over 6LoWPAN for Industrial Applications: An Experimental Study , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.
[75] Georg Carle,et al. DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.
[76] Utz Roedig,et al. Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[77] Kevin Weekly,et al. Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).
[78] Jorge Sá Silva,et al. Enabling Network-Layer Security on IPv6 Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[79] Jonathan Loo,et al. The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.
[80] Qian Zhu,et al. IOT Gateway: BridgingWireless Sensor Networks into Internet of Things , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[81] Jon Postel,et al. User Datagram Protocol , 1980, RFC.
[82] Jerald Martocci,et al. Building Automation Routing Requirements in Low-Power and Lossy Networks , 2010, RFC.
[83] Samuel Wieland. Design and implementation of a gateway for Web-based interaction and management of embedded devices , 2009 .
[84] Dirk Westhoff,et al. Security enhanced multi-hop over the air reprogramming with Fountain Codes , 2009, 2009 IEEE 34th Conference on Local Computer Networks.
[85] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[86] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[87] Kristofer S. J. Pister,et al. Industrial Routing Requirements in Low-Power and Lossy Networks , 2009, RFC.
[88] Yuguang Fang,et al. Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.
[89] Cristina Alcaraz,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..
[90] Daniel Minoli. IPv6 Over Low‐Power WPAN (6Lowpan) , 2013 .
[91] Georg Carle,et al. A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.
[92] Suman Nath,et al. SensorMap for Wide-Area Sensor Webs , 2007, Computer.
[93] Jorge Sá Silva,et al. Application-Layer Security for the WoT: Extending CoAP to Support End-to-End Message Security for Internet-Integrated Sensing Applications , 2013, WWIC.
[94] Esko Dijk,et al. DTLS-based Multicast Security for Low-Power and Lossy Networks (LLNs) , 2012 .
[95] Vipul Gupta,et al. Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[96] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[97] Jorge Sá Silva,et al. A secure interconnection model for IPv6 enabled wireless sensor networks , 2010, 2010 IFIP Wireless Days.
[98] Bogdan M. Wilamowski,et al. The Transmission Control Protocol , 2005, The Industrial Information Technology Handbook.
[99] Pascal Thubert,et al. Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks , 2011, RFC.
[100] Tzeta Tsao. A Security Design for RPL: IPv6 Routing Protocol for Low Power and Lossy Networks , 2010 .
[101] Kamin Whitehouse,et al. Stream Feeds - An Abstraction for the World Wide Sensor Web , 2008, IOT.
[102] Marko Hölbl,et al. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.
[103] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[104] Klaus Wehrle,et al. Towards viable certificate-based authentication for the internet of things , 2013, HotWiSec '13.