Layer Based Security in Internet of Things: Current Mechanisms, Prospective Attacks, and Future Orientation
暂无分享,去创建一个
[1] Douglas Selent. ADVANCED ENCRYPTION STANDARD , 2010 .
[2] Óscar García-Morchón,et al. End-to-End Transport Security in the IP-Based Internet of Things , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).
[3] Laurence T. Yang,et al. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things , 2015, IEEE Transactions on Parallel and Distributed Systems.
[4] Dhananjay Singh. Developing an architecture: Scalability, mobility, control, and isolation on future internet services , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[5] C. K. Jha,et al. Implementing the Logical Security Framework for E-Commerce Based on Service-Oriented Architecture , 2016 .
[6] Ashish Kr Luhach,et al. Applying SOA to an E-commerce system and designing a logical security framework for small and medium sized E-commerce based on SOA , 2014, 2014 IEEE International Conference on Computational Intelligence and Computing Research.
[7] Chiara Petrioli,et al. Security as a CoAP resource: An optimized DTLS implementation for the IoT , 2015, 2015 IEEE International Conference on Communications (ICC).
[8] Daeyoung Kim,et al. Practical security analysis for the constrained node networks: Focusing on the DTLS protocol , 2015, 2015 5th International Conference on the Internet of Things (IOT).
[9] Tsvetko Tsvetkov. RPL: IPv6 Routing Protocol for LOW Power and Lossy Networks , 2011 .
[10] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[11] Lan Li. Study on security architecture in the Internet of Things , 2012 .
[12] Gennaro Boggia,et al. Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.
[13] Jorge Sá Silva,et al. End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication , 2013, 2013 IFIP Networking Conference.
[14] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[15] Muhammad Waseem,et al. A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .
[16] Xu Xiaohui,et al. Study on Security Problems and Key Technologies of the Internet of Things , 2013, 2013 International Conference on Computational and Information Sciences.
[17] Miao Wu,et al. Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[18] Maode Ma,et al. An authentication and key establishment scheme to enhance security for M2M in 6LoWPANs , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[19] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.