Low power link layer security for IoT: Implementation and performance analysis
暂无分享,去创建一个
[1] Chiara Petrioli,et al. Flexible key exchange negotiation for wireless sensor networks , 2010, WiNTECH '10.
[2] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[3] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[4] Carsten Bormann,et al. The Constrained Application Protocol (CoAP) , 2014, RFC.
[5] Eric Anderson,et al. X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks , 2006, SenSys '06.
[6] Riccardo Bonetto,et al. Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[7] Michele Zorzi,et al. Web Services for the Internet of Things through CoAP and EXI , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).
[8] David E. Culler,et al. Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.
[9] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[10] Morris Dworkin,et al. Special Publication 800-38C, Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality , 2003 .
[11] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[12] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[13] Ingrid Verbauwhede,et al. Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks , 2006, ESAS.
[14] David E. Culler,et al. Versatile low power media access for wireless sensor networks , 2004, SenSys '04.
[15] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality [including updates through 7/20/2007] , 2004 .
[16] Morris J. Dworkin. SP 800-38C. Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality , 2004 .
[17] Carsten Bormann,et al. 6LoWPAN: The Wireless Embedded Internet , 2009 .
[18] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .