A Survey on Wireless Sensors Networks Security Based on a Layered Approach
暂无分享,去创建一个
[1] Luigi Atzori,et al. Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.
[2] Srdjan Krco,et al. Performance evaluation of compact binary XML representation for constrained devices , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[3] Jorge Sá Silva,et al. On the Effectiveness of End-to-End Security for Internet-Integrated Sensing Applications , 2012, 2012 IEEE International Conference on Green Computing and Communications.
[4] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[5] Yusuke Doi,et al. XML-less EXI with code generation for integration of embedded devices in web based systems , 2012, 2012 3rd IEEE International Conference on the Internet of Things.
[6] N. Vlajic,et al. Performance Analysis of ZigBee-Based Wireless Sensor Networks with Path-Constrained Mobile Sink(s) , 2009, 2009 Third International Conference on Sensor Technologies and Applications.
[7] Carsten Bormann,et al. Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) , 2012, RFC.
[8] Pedro Castillejo,et al. Automated determination of security services to ensure personal data protection in the Internet of Things applications , 2013, Third International Conference on Innovative Computing Technology (INTECH 2013).
[9] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[10] Sophie Chabridon,et al. Trust-Based Context Contract Models for the Internet of Things , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.
[11] Carles Gomez,et al. Wireless home automation networks: A survey of architectures and technologies , 2010, IEEE Communications Magazine.
[12] D. Habibi,et al. Performance evaluation of IEEE 802.15.4 for mobile sensor networks , 2008, 2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08).
[13] Andrea Zanella,et al. Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.
[14] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[15] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[16] Manfred Tscheligi,et al. uTRUSTit - Usable Trust in the Internet of Things , 2012, TrustBus.
[17] Luca Mainetti,et al. Implementation of the EXI Schema on Wireless Sensor Nodes Using Contiki , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[18] Klaus Wehrle,et al. Slimfit — A HIP DEX compression layer for the IP-based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[19] Antonio F. Skarmeta,et al. A decentralized approach for security and privacy challenges in the Internet of Things , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[20] Antonio Iera,et al. From "smart objects" to "social objects": The next evolutionary step of the internet of things , 2014, IEEE Communications Magazine.
[21] Guy Pujolle,et al. HIP Tags Privacy Architecture , 2008, 2008 Third International Conference on Systems and Networks Communications.
[22] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[23] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[24] Wolfgang Leister,et al. Ideas for a Trust Indicator in the Internet of Things , 2012 .
[25] Ana R. Cavalli,et al. An Effective Attack Detection Approach in Wireless Mesh Networks , 2013, AINA Workshops.
[26] Luciano Lavagno,et al. An Authentication and Key Establishment Scheme for the IP-Based Wireless Sensor Networks , 2012, ANT/MobiWIS.
[27] Sharifah H. S. Ariffin,et al. Performance analysis for 6loWPAN IEEE 802.15.4 with IPv6 network , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.
[28] Neeli R. Prasad,et al. A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.
[29] Joel J. P. C. Rodrigues,et al. Network Admission Control Solution for 6LoWPAN Networks , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[30] Luigi Atzori,et al. Network navigability in the social Internet of Things , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[31] Michele Zorzi,et al. Web Services for the Internet of Things through CoAP and EXI , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).
[32] Pascal Urien,et al. HIP-tags architecture implementation for the Internet of things , 2009, 2009 First Asian Himalayas International Conference on Internet.
[33] Paolo Pagano,et al. Architecture, Functional Requirements, and Early Implementation of an Instrumentation Grid for the IoT , 2012, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems.
[34] Jamshid B. Mohasefi,et al. A novel three party key establishment scheme in the context of Internet-of-Things , 2013, 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC).
[35] Peter Friess,et al. Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems , 2013 .
[36] Óscar García-Morchón,et al. HIP Security Architecture for the IP-Based Internet of Things , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[37] Pascal Urien,et al. HIP-TAG, a new paradigm for the Internet of Things , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[38] Georg Carle,et al. A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.
[39] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.