Secure Group Mobility Support for 6LoWPAN Networks
暂无分享,去创建一个
[1] Mats Björkman,et al. Interoperability in heterogeneous Low-Power Wireless Networks for Health Monitoring Systems , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).
[2] Carsten Bormann,et al. From 6LoWPAN to 6Lo: Expanding the Universe of IPv6-Supported Technologies for the Internet of Things , 2017, IEEE Communications Magazine.
[3] Xuemin Shen,et al. SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[4] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[5] Deepthi Sasidharan,et al. Handover Efficiency Improvement in Proxy Mobile IPv6(PMIPv6) Networks , 2015 .
[6] Rajeev Koodli. Mobile IPv6 Fast Handovers , 2009, RFC.
[7] Ejaz Ahmed,et al. Green industrial networking: recent advances, taxonomy, and open research challenges , 2016, IEEE Communications Magazine.
[8] Vlado Handziski,et al. Industrial Wireless IP-Based Cyber –Physical Systems , 2016, Proceedings of the IEEE.
[9] Marc Stevens,et al. The First Collision for Full SHA-1 , 2017, CRYPTO.
[10] Wang Lulu,et al. Low-power Wireless Sensor Network protocol of Mobile Health based on IPv6 , 2016, 2016 35th Chinese Control Conference (CCC).
[11] Thomas Narten,et al. Neighbor Discovery for IP Version 6 (IPv6) , 1996, RFC.
[12] Jin Cao,et al. G2RHA:Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks , 2017, IEEE Transactions on Vehicular Technology.
[13] Yi Mu,et al. A secure mobility support scheme for 6LoWPAN wireless sensor networks , 2014, Secur. Commun. Networks.
[14] Tiago Gomes,et al. A 6LoWPAN Accelerator for Internet of Things Endpoint Devices , 2018, IEEE Internet of Things Journal.
[15] Elaine B. Barker,et al. SP 800-131A. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths , 2011 .
[16] Fang-Yie Leu,et al. Comments on “SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks” , 2018, IEEE Systems Journal.
[17] Hyunseung Choo,et al. A novel scheme for preventing Out-Of-Order Packets in fast handover for Proxy Mobile IPv6 , 2014, The International Conference on Information Networking 2014 (ICOIN2014).
[18] Carsten Bormann,et al. Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) , 2012, RFC.
[19] Frank Xia,et al. Fast Handovers for Proxy Mobile IPv6 , 2010, RFC.
[20] Choong Seon Hong,et al. A 6LoWPAN Sensor Node Mobility Scheme Based on Proxy Mobile IPv6 , 2012, IEEE Transactions on Mobile Computing.
[21] David E. Culler,et al. Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.
[22] Mi Wen,et al. Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks , 2016, IEEE Internet of Things Journal.
[23] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[24] Elaine B. Barker. Recommendation for Key Management - Part 1 General , 2014 .
[25] Pascal Thubert,et al. Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks , 2011, RFC.
[26] Jon Crowcroft,et al. Optimized 6LoWPAN Fragmentation Header , 2016 .
[27] Jin Cao,et al. UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[28] Bo Huang,et al. A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks , 2012, IEEE Communications Letters.
[29] Elaine B. Barker,et al. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths , 2011 .
[30] Chih-Shun Hsu,et al. An enhanced group mobility protocol for 6LoWPAN-based wireless body area networks , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[31] François-Xavier Standaert,et al. On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[32] Meng Chang Chen,et al. SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks , 2013, IEEE Systems Journal.
[33] Joel J. P. C. Rodrigues,et al. Network Admission Control Solution for 6LoWPAN Networks Based on Symmetric Key Mechanisms , 2016, IEEE Transactions on Industrial Informatics.
[34] Basavaraj Patil,et al. Proxy Mobile IPv6 , 2008, RFC.
[35] Dong Zheng,et al. SEIP: Secure and seamless IP communications for group-oriented machine to machine communications , 2017, Peer-to-Peer Networking and Applications.
[36] Fernando Gont. A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC) , 2014, RFC.
[37] Abderrezak Rachedi,et al. A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology , 2016, Comput. Commun..
[38] Jin Cao,et al. GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks , 2015, 2015 IEEE International Conference on Communications (ICC).