Internet of Things and Wireless Physical Layer Security: A Survey
暂无分享,去创建一个
[1] François Carrez,et al. Designing IoT architecture(s): A European perspective , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[2] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[3] Pascal Thubert,et al. Objective Function Zero for the Routing Protocol for Low-Power and Lossy Networks (RPL) , 2012, RFC.
[4] Jorge Sá Silva,et al. Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey , 2015, Ad Hoc Networks.
[5] Sarmad Ullah Khan,et al. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.
[6] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.
[7] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[8] Lorenzo Mucchi,et al. The Role of Physical Layer Security in IoT: A Novel Perspective , 2016, Inf..
[9] Taeshik Shon,et al. An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions , 2007, NBiS.
[10] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[11] Georgios Kambourakis,et al. Attacks and Countermeasures on 802.16: Analysis and Assessment , 2013, IEEE Communications Surveys & Tutorials.
[12] Yu Yang,et al. Study and application on the architecture and key technologies for IOT , 2011, 2011 International Conference on Multimedia Technology.
[13] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[14] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[15] Peyman Kabiri,et al. Identification of effective network features to detect Smurf attacks , 2009, 2009 IEEE Student Conference on Research and Development (SCOReD).
[16] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[17] Simon G. M. Koo,et al. Internet of Things: Services and Applications Categorization , 2011, Adv. Internet Things.