A new user authentication mechanism for IETF 6TiSCH protocol
暂无分享,去创建一个
[1] Mahesh Sooriyabandara,et al. A Storage Centric Approach to Scalable Sensor Networks , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).
[2] Maode Ma,et al. A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks , 2016, IEEE Transactions on Industrial Informatics.
[3] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[4] Adam Dunkels,et al. Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[5] Alireza Esfahani,et al. A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment , 2019, IEEE Internet of Things Journal.
[6] Jiang Zhu,et al. Fog Computing: A Platform for Internet of Things and Analytics , 2014, Big Data and Internet of Things.
[7] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[8] Carsten Bormann,et al. The Constrained Application Protocol (CoAP) , 2014, RFC.
[9] Adam Dunkels,et al. Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[10] Mahesh Sooriyabandara,et al. Content centric routing in IoT networks and its integration in RPL , 2016, Comput. Commun..
[11] Sateesh Addepalli,et al. Fog computing and its role in the internet of things , 2012, MCC '12.
[12] Ludwig Seitz,et al. Object Security of CoAP (OSCOAP) , 2016 .