Security analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT)
暂无分享,去创建一个
[1] Neeli R. Prasad,et al. An Investigation on IEEE 802.15.4 MAC Layer Attacks , 2007 .
[2] Maxim Raya,et al. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.
[3] Michael Richardson. security architecture for 6top: requirements and structure , 2014 .
[4] Louis Coetzee,et al. The Internet of Things - promise for the future? An introduction , 2011, 2011 IST-Africa Conference Proceedings.
[5] Kevin Ashton,et al. That ‘Internet of Things’ Thing , 1999 .
[6] Maria Rita Palattella,et al. Using IEEE802.15.4e TSCH in an LLN context: Overview, Problem Statement and Goals , 2013 .
[7] Gerd Kortuem,et al. Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.
[8] Nitin H. Vaidya,et al. Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[9] John S. Baras,et al. A framework for MAC protocol misbehavior detection in wireless networks , 2005, WiSe '05.
[10] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[11] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[12] Yang Xiao,et al. Security services and enhancements in the IEEE 802.15.4 wireless sensor networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[13] Jelena Misic,et al. On Security Attacks in HealthcareWSNs Implemented on 802.15.4 Beacon Enabled Clusters , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[14] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[15] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[16] John S. Baras,et al. Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers , 2007, J. Comput. Secur..
[17] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[18] Ping Pan,et al. Internet Engineering Task Force , 1995 .
[19] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[20] Jerry den Hartog,et al. Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[21] Ramón Cáceres,et al. Ubicomp Systems at 20: Progress, Opportunities, and Challenges , 2012, IEEE Pervasive Computing.
[22] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[23] I. Korkmaz,et al. On the IEEE 802.15.4 MAC Layer Attacks: GTS Attack , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).
[24] Kristofer S. J. Pister,et al. TSMP: TIME SYNCHRONIZED MESH PROTOCOL , 2008 .
[25] John Seely Brown,et al. The Origins of Ubiquitous Computing Research at PARC in the Late 1980s , 1999, IBM Syst. J..
[26] Subir Das,et al. Security Framework and Key Management Protocol Requirements for 6TSCH , 2013 .