Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers
暂无分享,去创建一个
[1] Jeffrey H. Meyerson,et al. The Go Programming Language , 2014, IEEE Softw..
[2] M. Brownfield,et al. Wireless sensor network denial of sleep attack , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[3] Sheila Frankel,et al. IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap , 2011, RFC.
[4] Brian W. Kernighan,et al. The Go Programming Language , 2015 .
[5] Eric Rescorla,et al. Datagram Transport Layer Security , 2006, RFC.
[6] Christoph Meinel,et al. Enabling En-Route Filtering for End-to-End Encrypted CoAP Messages , 2017, SenSys.
[7] Gennaro Boggia,et al. Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.
[8] Shivakant Mishra,et al. Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.
[9] Martin H. Weik. Computer Science and Communications Dictionary , 2000 .
[10] Shiuh-Pyng Shieh,et al. Emerging Security Threats and Countermeasures in IoT , 2015, AsiaCCS.
[11] Syed Obaid Amin,et al. A novel Intrusion Detection Framework for IP-based sensor networks , 2009, 2009 International Conference on Information Networking.
[12] Carsten Bormann,et al. The Constrained Application Protocol (CoAP) , 2014, RFC.
[13] Zach Shelby,et al. Constrained RESTful Environments (CoRE) Link Format , 2012, RFC.
[14] Ludwig Seitz,et al. Object Security for Constrained RESTful Environments (OSCORE) , 2019, RFC.
[15] Siarhei Kuryla,et al. RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .
[16] David E. Culler,et al. Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.
[17] Carsten Bormann,et al. Block-Wise Transfers in the Constrained Application Protocol (CoAP) , 2016, RFC.
[18] Pascal Thubert,et al. Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks , 2011, RFC.