EdgeSec: Design of an Edge Layer Security Service to Enhance IoT Security
暂无分享,去创建一个
Wei Wei | Zhiwei Wang | Kewei Sha | T. Andrew Yang | Ranadheer Errabelly | Kewei Sha | Wei Wei | T. Yang | Zhiwei Wang | Ranadheer Errabelly
[1] Tero Kivinen. Minimal Internet Key Exchange Version 2 (IKEv2) Initiator Implementation , 2016, RFC.
[2] Cataldo Basile,et al. Virtualized security at the network edge: a user-centric approach , 2015, IEEE Communications Magazine.
[3] Srivaths Ravi,et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.
[4] Michael W. Condry,et al. Using Smart Edge IoT Devices for Safer, Rapid Response With Industry IoT Control Operations , 2016, Proceedings of the IEEE.
[5] Magdy A. Bayoumi,et al. A Novel Authentication and Key Agreement Protocol for Internet of Things Based Resource-Constrained Body Area Sensors , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).
[6] Djamal Zeghlache,et al. Lightweight collaborative key establishment scheme for the Internet of Things , 2014, Comput. Networks.
[7] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[8] Hyeong-Ah Choi,et al. Securing smart home: Technologies, security challenges, and security requirements , 2014, 2014 IEEE Conference on Communications and Network Security.
[9] Andreas Jacobsson,et al. Towards a model of privacy and security for smart homes , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[10] Qian Zhu,et al. IOT Gateway: BridgingWireless Sensor Networks into Internet of Things , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[11] Weisong Shi,et al. Security in Internet of Things: Opportunities and Challenges , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).
[12] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[13] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[14] Eric Rescorla,et al. Datagram Transport Layer Security Version 1.2 , 2012, RFC.
[15] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[16] Zhiwei Wang,et al. A Secure and Efficient Framework to Read Isolated Smart Grid Devices , 2017, IEEE Transactions on Smart Grid.
[17] Georg Carle,et al. A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.
[18] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[19] Nicky Mouha,et al. Report on Lightweight Cryptography , 2017 .
[20] Thiemo Voigt,et al. Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.
[21] J. Manyika,et al. Disruptive technologies: Advances that will transform life, business, and the global economy , 2013 .
[22] Ali Ismail Awad,et al. A Distributed Security Mechanism for Resource-Constrained IoT Devices , 2016, Informatica.