A payload-based mutual authentication scheme for Internet of Things
暂无分享,去创建一个
Muhammad Alam | Muhammad Usman | Mian Ahmad Jan | Fazlullah Khan | F. Khan | Muhammad Usman | M. Jan | Muhammad Alam | Fazlullah Khan
[1] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.3 , 2018, RFC.
[2] Jo Woon Chong,et al. A time synchronization technique for coap-based home automation systems , 2016, IEEE Transactions on Consumer Electronics.
[3] Jorge Sá Silva,et al. On the feasibility of secure application-layer communications on the Web of Things , 2012, 37th Annual IEEE Conference on Local Computer Networks.
[4] Mari Carmen Domingo,et al. An overview of the internet of underwater things , 2012, J. Netw. Comput. Appl..
[5] Wade Trappe,et al. Low-Energy Security: Limits and Opportunities in the Internet of Things , 2015, IEEE Security & Privacy.
[6] Ivan Livaja,et al. EXTENSIBLE MESSAGING AND PRESENCE PROTOCOL (XMPP) , 2018 .
[7] BottaAlessio,et al. Integration of Cloud computing and Internet of Things , 2016 .
[8] Andrea Zanella,et al. Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios , 2015, IEEE Wireless Communications.
[9] Randy Bush,et al. Serial Number Arithmetic , 1996, RFC.
[10] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[11] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[12] Peter Saint-Andre,et al. Extensible Messaging and Presence Protocol (XMPP): Address Format , 2011, RFC.
[13] Jorge Sá Silva,et al. On the Effectiveness of End-to-End Security for Internet-Integrated Sensing Applications , 2012, 2012 IEEE International Conference on Green Computing and Communications.
[14] Ping Luo,et al. A distributed expansible authentication model based on Kerberos , 2008, J. Netw. Comput. Appl..
[15] Jaeho Kim,et al. M2M Service Platforms: Survey, Issues, and Enabling Technologies , 2014, IEEE Communications Surveys & Tutorials.
[16] K. Kuladinithi,et al. Implementation of CoAP and its Application in Transport Logistics , 2011 .
[17] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[18] Pete Chown,et al. Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS) , 2002, RFC.
[19] Ludwig Seitz,et al. Design Considerations for Security Protocols in Constrained Environments , 2014 .
[20] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[21] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[22] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[23] Deepak Choudhary,et al. Internet of things: A survey on enabling technologies, application and standardization , 2018 .
[24] Anna Calveras Augé,et al. TinyCoAP: A Novel Constrained Application Protocol (CoAP) Implementation for Embedding RESTful Web Services in Wireless Sensor Networks Based on TinyOS , 2013, J. Sens. Actuator Networks.
[25] Xiangjian He,et al. A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[26] Klaus Hartke,et al. Observing Resources in the Constrained Application Protocol (CoAP) , 2015, RFC.
[27] Roy T. Fielding,et al. Principled design of the modern Web architecture , 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.
[28] Jari Arkko,et al. CoAP Security Architecture , 2011 .
[29] Eric Rescorla,et al. Guidelines for Writing RFC Text on Security Considerations , 2003, RFC.
[30] Thiemo Voigt,et al. INDIGO: Secure CoAP for Smartphones Enabling E2E Secure Communication in the 6IoT , 2013 .
[31] Soma Bandyopadhyay,et al. Lightweight mutual authentication for CoAP (WIP) , 2014 .
[32] Xiaoping Ma,et al. Performance evaluation of MQTT and CoAP via a common middleware , 2014, 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[33] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[34] Klaus Hartke,et al. Practical Issues with Datagram Transport Layer Security in Constrained Environments , 2014 .
[35] Kuldip Singh,et al. A secure dynamic identity based authentication protocol for multi-server architecture , 2011, J. Netw. Comput. Appl..
[36] Carsten Bormann,et al. The Constrained Application Protocol (CoAP) , 2014, RFC.
[37] Eric Rescorla,et al. Datagram Transport Layer Security Version 1.2 , 2012, RFC.
[38] Ludwig Seitz,et al. S3K: Scalable Security With Symmetric Keys—DTLS Key Establishment for the Internet of Things , 2016, IEEE Transactions on Automation Science and Engineering.
[39] Georg Carle,et al. DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.