An Analysis of Secure M2M Communication in WSNs Using DTLS
暂无分享,去创建一个
[1] Hannes Tschofenig,et al. Internet Engineering Task Force (ietf) Using Raw Public Keys in Transport Layer Security (tls) and Datagram Transport Layer Security (dtls) , 2022 .
[2] Ingrid Moerman,et al. Secure communication in IP-based wireless sensor networks via a trusted gateway , 2015, 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[3] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[4] Ana R. Cavalli,et al. A Survey on Wireless Sensors Networks Security Based on a Layered Approach , 2015, WWIC.
[5] Thiemo Voigt,et al. Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.
[6] Jorge Sá Silva,et al. On the Effectiveness of End-to-End Security for Internet-Integrated Sensing Applications , 2012, 2012 IEEE International Conference on Green Computing and Communications.
[7] Carsten Bormann,et al. The Constrained Application Protocol (CoAP) , 2014, RFC.
[8] Eric Rescorla,et al. Datagram Transport Layer Security Version 1.2 , 2012, RFC.
[9] Carlos Pereira,et al. Towards Efficient Mobile M2M Communications: Survey and Open Challenges , 2014, Sensors.
[10] Georg Carle,et al. A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.
[11] Michele Zorzi,et al. BlinkToSCoAP: An end-to-end security framework for the Internet of Things , 2015, 2015 7th International Conference on Communication Systems and Networks (COMSNETS).