Link-layer security in TSCH networks: effect on slot duration
暂无分享,去创建一个
[1] Gennaro Boggia,et al. On Optimal Scheduling in Duty-Cycled Industrial IoT Applications Using IEEE802.15.4e TSCH , 2013, IEEE Sensors Journal.
[2] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[3] Russ Housley,et al. Using Advanced Encryption Standard (AES) Counter Mode With IPsec Encapsulating Security Payload (ESP) , 2004, RFC.
[4] Andrzej Duda,et al. OSCAR: Object security architecture for the Internet of Things , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[5] Panu Hämäläinen,et al. Efficient hardware implementation of security processing for IEEE 802.15.4 wireless networks , 2005 .
[6] David A. McGrew,et al. AES-CCM Cipher Suites for Transport Layer Security (TLS) , 2012, RFC.
[7] Feng Cheng,et al. Performance impact of and protocol interdependencies of IEEE 802.15.4 security mechanisms , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[8] Gourab Sen Gupta,et al. Smart Sensors and Sensing Technology , 2008 .
[9] Yan Zhang,et al. Superframe Planning and Access Latency of Slotted MAC for Industrial WSN in IoT Environment , 2014, IEEE Transactions on Industrial Informatics.
[10] Thomas Watteyne,et al. Adaptive Synchronization in IEEE802.15.4e Networks , 2014, IEEE Transactions on Industrial Informatics.
[11] Nicola Bui,et al. Low power link layer security for IoT: Implementation and performance analysis , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[12] Jonathan Tse,et al. AES Hardware-Software Co-design in WSN , 2015, 2015 21st IEEE International Symposium on Asynchronous Circuits and Systems.
[13] Kristofer S. J. Pister,et al. TSMP: TIME SYNCHRONIZED MESH PROTOCOL , 2008 .
[14] David A. McGrew,et al. AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS , 2014, RFC.
[15] Utz Roedig,et al. Demo abstract: Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[16] Gianluca Dini,et al. On experimentally evaluating the impact of security on IEEE 802.15.4 networks , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[17] Yu Han,et al. An Energy-Efficient AES-CCM Implementation for IEEE802.15.4 Wireless Sensor Networks , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.
[18] Andrzej Duda,et al. Energy cost of security in an energy-harvested IEEE 802.15.4 Wireless Sensor Network , 2014, 2014 3rd Mediterranean Conference on Embedded Computing (MECO).
[19] Thomas Watteyne,et al. OpenMote: Open-Source Prototyping Platform for the Industrial IoT , 2015, ADHOCNETS.
[20] Charalampos Manifavas,et al. IPsec over IEEE 802.15.4 for low power and lossy networks , 2013, MobiWac '13.
[21] Utz Roedig,et al. Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN , 2014, Secur. Commun. Networks.
[22] Utz Roedig,et al. Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[23] Thomas Watteyne,et al. Technical Overview of SmartMesh IP , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[24] Yang Xiao,et al. MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..
[25] Diego Dujovne,et al. 6TiSCH: deterministic IP-enabled industrial internet (of things) , 2014, IEEE Communications Magazine.
[26] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[27] Kevin Weekly,et al. OpenWSN: a standards‐based low‐power wireless development environment , 2012, Trans. Emerg. Telecommun. Technol..
[28] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[29] Hannes Tschofenig,et al. Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.
[30] Elfed Lewis,et al. Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes , 2008 .
[31] Kostas Berberidis,et al. Low Complexity Turbo Equalization for High Data Rate Wireless Communications , 2006, EURASIP J. Wirel. Commun. Netw..