A PKI Adapted Model for Secure Information Dissemination in Industrial Control and Automation 6LoWPANs
暂无分享,去创建一个
Mohammad S. Obaidat | Anandarup Mukherjee | Sudip Misra | Chaynika Taneja | Sumit Goswami | M. Obaidat | S. Misra | S. Goswami | Anandarup Mukherjee | Chaynika Taneja
[1] John R. Vacca. Cyber Security and IT Infrastructure Protection , 2013 .
[2] Utz Roedig,et al. Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[3] Sudip Misra,et al. Geographic server distribution model for key revocation , 2010, Telecommun. Syst..
[4] Thomas F. La Porta,et al. Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks , 2007, IEEE Trans. Mob. Comput..
[5] Rabia Riaz,et al. Security analysis survey and framework design for IP connected LoWPANs , 2009, 2009 International Symposium on Autonomous Decentralized Systems.
[6] Meng Wu,et al. Cooperative communications based on trust model for mobile ad hoc networks , 2010, IET Inf. Secur..
[7] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[8] Om Prakash,et al. EMAP: EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VEHICULAR AD HOC NETWORKS , 2014 .
[9] K. J. Ray Liu,et al. Handbook on Array Processing and Sensor Networks , 2010 .
[10] Sudip Misra,et al. Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks , 2011, Wirel. Commun. Mob. Comput..
[11] Ki-Hyung Kim,et al. A unified security framework with three key management schemes for wireless sensor networks , 2008, Comput. Commun..
[12] Jean-Philippe Vasseur,et al. Interconnecting Smart Objects with IP: The Next Internet , 2010 .
[13] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[14] K. J. Ray Liu,et al. Handbook on Array Processing and Sensor Networks: Haykin/Array Processing , 2010 .
[15] Carlisle Adams,et al. Understanding PKI: Concepts, Standards, and Deployment Considerations , 1999 .
[16] Mohsen Guizani,et al. An enhanced public key infrastructure to secure smart grid wireless communication networks , 2014, IEEE Network.
[17] Andrea Zanella,et al. Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.
[18] Olivier Hersent,et al. The Internet of Things: Key Applications and Protocols , 2011 .
[19] David E. Culler,et al. Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.
[20] Frank Y. Li,et al. A Novel Approach to Trust Management in Unattended Wireless Sensor Networks , 2014, IEEE Transactions on Mobile Computing.
[21] David E. Culler,et al. Extending IP to Low-Power, Wireless Personal Area Networks , 2008, IEEE Internet Computing.
[22] Anandarup Mukherjee,et al. Securing intra-communication in 6LoWPAN: A PKI integrated scheme , 2014, 2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS).
[23] Olivier Hersent,et al. M2M Communications: A Systems Approach , 2012 .
[24] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[25] John R. Vacca. Computer and Information Security Handbook , 2009 .
[26] David E. Culler,et al. IPv6 in Low-Power Wireless Networks , 2010, Proceedings of the IEEE.
[27] Yunghsiang Sam Han,et al. A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.
[28] Yunlei Zhao,et al. Privacy-Preserving Authenticated Key-Exchange Over Internet , 2014, IEEE Transactions on Information Forensics and Security.
[29] Gianluca Dini,et al. An efficient key revocation protocol for wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[30] Ki-Hyung Kim,et al. Key Management in IP-based Ubiquitous Sensor Networks : Issues , Challenges and Solutions , 2007 .
[31] Gabriel Montenegro,et al. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.
[32] JeongGil Ko,et al. Connecting low-power and lossy networks to the internet , 2011, IEEE Communications Magazine.
[33] Hangyang Dai,et al. Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix , 2010, IEEE Sensors Journal.
[34] Rolf Oppliger. Certification Authorities Under Attack: A Plea for Certificate Legitimation , 2014, IEEE Internet Computing.
[35] Carsten Bormann,et al. 6LoWPAN: The Wireless Embedded Internet , 2009 .
[36] Hui Zhang,et al. Efficient Signcryption for Heterogeneous Systems , 2013, IEEE Systems Journal.
[37] Yacine Challal,et al. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.