Enhancing the security of the IoT LoraWAN architecture
暂无分享,去创建一个
[1] Alexis Olivereau,et al. D-HIP: A distributed key exchange scheme for HIP-based Internet of Things , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[2] Luca Veltri,et al. A novel batch-based group key management protocol applied to the Internet of Things , 2013, Ad Hoc Networks.
[3] Imed Romdhani,et al. A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK) , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[4] Giuseppe Piro,et al. Key Management Protocol with Implicit Certificates for IoT systems , 2015, IoT-Sys@MobiSys.
[5] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[6] XuLi,et al. The Internet of Things--A survey of topics and trends , 2015 .
[7] Ramaswamy Chandramouli,et al. Cryptographic Key Management Issues and Challenges in Cloud Services , 2014, Secure Cloud Computing.
[8] Jing Liu,et al. Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[9] N. Renugadevi,et al. Key management schemes for secure group communication in wireless networks - A survey , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).
[10] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[11] Djamel Tandjaoui,et al. A Cooperative End to End Key Management Scheme for E-health Applications in the Context of Internet of Things , 2014, ADHOC-NOW Workshops.
[12] Yue Li,et al. Design of a Key Establishment Protocol for Smart Home Energy Management System , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.
[13] Deepak Choudhary,et al. Internet of things: A survey on enabling technologies, application and standardization , 2018 .
[14] Yacine Challal,et al. Group Key Management Protocols: A Novel Taxonomy , 2008 .
[15] Andrei V. Gurtov,et al. Proxy-based end-to-end key establishment protocol for the Internet of Things , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).