SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN
暂无分享,去创建一个
[1] Hanno Wirtz,et al. 6LoWPAN fragmentation attacks and mitigation mechanisms , 2013, WiSec '13.
[2] Elisa Bertino,et al. Seamless and Secure Bluetooth LE Connection Migration , 2017, CODASPY.
[3] Abdulmotaleb El-Saddik,et al. Toward Social Internet of Vehicles: Concept, Architecture, and Applications , 2015, IEEE Access.
[4] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[5] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[6] Sylvain Kubler,et al. Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components , 2017, CONTEXT.
[7] Lata Ragha,et al. A rate limiting mechanism for defending against flooding based distributed denial of service attack , 2011, 2011 World Congress on Information and Communication Technologies.
[8] David E. Culler,et al. Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.
[9] Tuomas Aura,et al. Cryptographically Generated Addresses (CGA) , 2005, ISC.
[10] Carsten Bormann. Guidance for Light-Weight Implementations of the Internet Protocol Suite , 2012 .
[11] Amir Herzberg,et al. Fragmentation Considered Vulnerable , 2011, TSEC.
[12] Gabriel Montenegro,et al. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.
[13] Enrico Tronci. 1997 , 1997, Les 25 ans de l’OMC: Une rétrospective en photos.
[14] Myung-Ki Shin,et al. Transmission of IPv6 Packets over IEEE 802.16 , 2006 .
[15] Sheila Frankel,et al. IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap , 2011, RFC.
[16] J.T. Adams. An introduction to IEEE STD 802.15.4 , 2006, 2006 IEEE Aerospace Conference.
[17] Shivakant Mishra,et al. Secure code distribution in dynamically programmable wireless sensor networks , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[18] Klaus Wehrle,et al. Towards viable certificate-based authentication for the internet of things , 2013, HotWiSec '13.
[19] Hwajeong Seo,et al. Optimized implementation of chaskey MAC on 16-bit MSP430 , 2017, 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).
[20] Darren Reed,et al. Security Considerations for IP Fragment Filtering , 1995, RFC.
[21] Jonathan W. Hui,et al. Securing the Deluge network programming system , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[22] Peng Ning,et al. Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[23] Hassen Redwan,et al. Route-over vs mesh-under routing in 6LoWPAN , 2009, IWCMC.
[24] A. James. 2010 , 2011, Philo of Alexandria: an Annotated Bibliography 2007-2016.
[25] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[26] Jonathan Loo,et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..
[27] HyunGon Kim,et al. Protection Against Packet Fragmentation Attacks at 6LoWPAN Adaptation Layer , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.
[28] Jorge Lobo,et al. Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios , 2017, ESORICS.
[29] Sally Floyd,et al. Dynamics of TCP traffic over ATM networks , 1994 .
[30] Elisa Bertino,et al. Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices , 2017, IEEE Transactions on Mobile Computing.
[31] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[32] Robert Szabo,et al. Information and Communication Technologies , 2012, Lecture Notes in Computer Science.
[33] Sylvain Kubler,et al. Towards semantic interoperability in an open IoT ecosystem for connected vehicle services , 2017, 2017 Global Internet of Things Summit (GIoTS).
[34] Rajeev Gandhi,et al. Sluice: Secure Dissemination of Code Updates in Sensor Networks , 2005, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[35] Olaf Bergmann,et al. Datagram Transport Layer Security in Constrained Environments , 2012 .
[36] Richard Han,et al. Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .
[37] Sammy Chan,et al. Fair packet discarding for controlling ABR traffic in ATM networks , 1997, IEEE Trans. Commun..