Evaluating CoAP End to End Security for Constrained Wireless Sensor Networks
暂无分享,去创建一个
[1] Alan DeKok. Datagram Transport Layer Security (DTLS) as a Transport Layer for RADIUS , 2014, RFC.
[2] Thiemo Voigt,et al. 6LoWPAN Compressed DTLS for CoAP , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.
[3] Soma Bandyopadhyay,et al. LESS: Lightweight Establishment of Secure Session: A Cross-Layer Approach Using CoAP and DTLS-PSK Channel Encryption , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.
[4] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[5] Andrzej Duda,et al. DTLS performance in duty-cycled networks , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[6] Carsten Bormann,et al. The Constrained Application Protocol (CoAP) , 2014, RFC.
[7] Adam Dunkels,et al. Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[8] Thiemo Voigt,et al. Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.
[9] Chiara Petrioli,et al. Security as a CoAP resource: An optimized DTLS implementation for the IoT , 2015, 2015 IEEE International Conference on Communications (ICC).
[10] Georg Carle,et al. A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.