On securing IEEE 802.15.4 networks through a standard compliant framework
暂无分享,去创建一个
[1] Nicola Bui,et al. Low power link layer security for IoT: Implementation and performance analysis , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[2] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[3] Xinfang Zhang,et al. Implementation and Time Performance Analysis of Security Suite in LR-WPAN 802.15.4 , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[4] Rabia Riaz,et al. Security analysis survey and framework design for IP connected LoWPANs , 2009, 2009 International Symposium on Autonomous Decentralized Systems.
[5] Kevin Weekly,et al. OpenWSN: a standards‐based low‐power wireless development environment , 2012, Trans. Emerg. Telecommun. Technol..
[6] L. A. Grieco,et al. Performance analysis of the RPL Routing Protocol , 2011, 2011 IEEE International Conference on Mechatronics.
[7] Thiemo Voigt,et al. Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] Giuseppe Piro,et al. A standard compliant security framework for IEEE 802.15.4 networks , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[10] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[11] W. Marsden. I and J , 2012 .
[12] Garth V. Crosby,et al. Implementing IPsec in Wireless Sensor Networks , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).
[13] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[14] Ki-Hyung Kim,et al. IPv6 over Low Power WPAN Security Analysis , 2011 .
[15] Olivier Hersent,et al. The Internet of Things: Key Applications and Protocols , 2011 .
[16] Gennaro Boggia,et al. ROHC+: a new header compression scheme for TCP streams in 3G wireless systems , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[17] Oscar Garcia-Morchon,et al. Security Considerations in the IP-based Internet of Things , 2013 .
[18] Donato Di Paola,et al. IoT-aided robotics applications: Technological implications, target domains and open issues , 2014, Comput. Commun..
[19] Gennaro Boggia,et al. Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.
[20] Eric Rescorla,et al. Datagram Transport Layer Security Version 1.2 , 2012, RFC.
[21] Giuseppe Piro,et al. Optimal and secure protocols in the IETF 6TiSCH communication stack , 2014, 2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE).
[22] Soma Bandyopadhyay,et al. Auth-Lite: Lightweight M2MAuthentication reinforcing DTLS for CoAP , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).
[23] Ivan Martinovic,et al. Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis , 2010, ArXiv.
[24] Yongsuk Park,et al. Security Architecture for IEEE 802.15.4-based Wireless Sensor Network , 2009, 2009 4th International Symposium on Wireless Pervasive Computing.
[25] Tharam S. Dillon,et al. A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[26] Luca Veltri,et al. Batch-based group key management with shared key derivation in the Internet of Things , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[27] Esam A. A. A. Hagras,et al. Energy efficient key management scheme based on elliptic curve signcryption for Wireless Sensor Networks , 2011, 2011 28th National Radio Science Conference (NRSC).
[28] Michael Richardson. security architecture for 6top: requirements and structure , 2014 .
[29] Óscar García-Morchón,et al. End-to-End Transport Security in the IP-Based Internet of Things , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).