Improving security and mobility for remote access: A wireless sensor network case
暂无分享,去创建一个
Hamadou Saliah-Hassane | Ibrahima Ngom | Ousmane Sadio | Claude Lishou | H. Saliah-Hassane | C. Lishou | I. Ngom | Ousmane Sadio
[1] Lars Eggert,et al. Host Identity Protocol (HIP) Registration Extension , 2016, RFC.
[2] Pekka Nikander,et al. End-Host Mobility and Multihoming with the Host Identity Protocol , 2008, RFC.
[3] Wei Luo,et al. Layer 2 Virtual Private Network (L2VPN) Extensions for Layer 2 Tunneling Protocol (L2TP) , 2006, RFC.
[4] Mohammad S. Obaidat,et al. Design and analysis of secure host-based mobility protocol for wireless heterogeneous networks , 2013, The Journal of Supercomputing.
[5] Pekka Nikander,et al. Host Identity Protocol (HIP) Architecture , 2006, RFC.
[6] Andrei Gurtov. Host Identity Protocol (HIP): Towards the Secure Mobile Internet , 2008 .
[7] Lars Eggert,et al. Host Identity Protocol (HIP) Rendezvous Extension , 2016, RFC.
[8] H. Anthony Chan,et al. Inter-subnet localized mobility support for host identity protocol , 2011, EURASIP J. Wirel. Commun. Netw..
[9] Pekka Nikander,et al. Host Identity Protocol , 2005 .
[10] Tuomas Aura,et al. Analysis of the HIP Base Exchange Protocol , 2005, ACISP.
[11] Mingyan Liu,et al. Design of Low Data-Rate Environmental Monitoring Applications , 2014 .
[12] Andrei Gurtov,et al. Next-Generation Internet Architectures and Protocols: Host identity protocol (HIP): an overview , 2011 .
[13] Glen Zorn,et al. Securing L2TP using IPsec , 2001, RFC.
[14] Jan Melén,et al. Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP) , 2008, RFC.
[15] John Krumm,et al. Ubiquitous Computing Fundamentals , 2009 .