Security Access Protocols in IoT Capillary Networks
暂无分享,去创建一个
Alessandro Neri | Anna Maria Vegni | Romeo Giuliano | Franco Mazzenga | A. Neri | F. Mazzenga | A. Vegni | R. Giuliano
[1] Romeo Giuliano,et al. Consumed power analysis for mobile radio system dimensioning , 2013, 2013 IEEE International Conference on Communications (ICC).
[2] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[3] Alessandro Neri,et al. Security Access Protocols in IoT Networks with Heterogenous Non-IP Terminals , 2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems.
[4] Mark Nixon,et al. A Comparison of WirelessHART™ and ISA100.11a , 2012 .
[5] Jaeho Kim,et al. A device software platform for consumer electronics based on the internet of things , 2015, IEEE Transactions on Consumer Electronics.
[6] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[7] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[8] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[9] Jian Shen,et al. A Survey on Key Management for Body Sensor Network , 2015, 2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA).
[10] Maurizio A. Spirito,et al. Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[11] Gennaro Boggia,et al. Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.
[12] A. Benslimane,et al. Analytical study of security aspects in 6LoWPAN networks , 2013, 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M).
[13] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[14] J. Li,et al. Smart city and the applications , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).
[15] A Jesudoss,et al. A SURVEY ON AUTHENTICATION ATTACKS AND COUNTERMEASURES IN A DISTRIBUTED ENVIRONMENT , 2014 .
[16] Rochit Rajsuman. System-On-A-Chip: Design and Test , 2000 .
[17] Carsten Bormann,et al. 6LoWPAN: The Wireless Embedded Internet , 2009 .
[18] Paulo S. L. M. Barreto,et al. A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.
[19] Witold Kinsner. Towards cognitive security systems , 2012, 2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing.
[20] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[21] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[22] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[23] Geoff Mulligan,et al. The 6LoWPAN architecture , 2007, EmNets '07.
[24] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[25] Alessandro Neri,et al. End-to-end secure connection in heterogeneous networks for critical scenarios , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[26] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[27] V. Kumar Chinnaiyan,et al. Survey on smart grid technologies- smart metering, IoT and EMS , 2014, 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science.
[28] R. Giuliano,et al. Security implementation in heterogeneous networks with long delay channel , 2012, 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL).
[29] Evangelos N. Gazis,et al. A survey of technologies for the internet of things , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).
[30] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[31] Miika Komu,et al. Capillary networks - bridging the cellular and IoT worlds , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).