An Overview of Security in CoAP: Attack and Analysis
暂无分享,去创建一个
[1] M. Zulfiker Ali,et al. Architecture for IoT Domain With CoAP Observe Feature , 2018, IEEE Internet of Things Journal.
[2] Kanchana P. Naik,et al. Performance analysis of constrained application protocol using Cooja simulator in Contiki OS , 2017, 2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT).
[3] Anna Calveras Augé,et al. A Proxy Design to Leverage the Interconnection of CoAP Wireless Sensor Networks with Web Applications , 2015, Sensors.
[4] Babar Shah,et al. Security analysis of IoT protocols: A focus in CoAP , 2016, 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC).
[5] P. Bagavathi Sivakumar,et al. Design of IoT Systems and Analytics in the Context of Smart City Initiatives in India , 2016 .
[6] Thiemo Voigt,et al. Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.
[7] Laisa Caroline de Paula Costa,et al. Enabling CoAP into the swarm: A transparent interception CoAP-HTTP proxy for the Internet of Things , 2017, 2017 Global Internet of Things Summit (GIoTS).
[8] Deepak Arora,et al. Analyzing and evaluating the performance of 6L0WPAN and RPL using CONTIKI , 2017, 2017 International Conference on Intelligent Sustainable Systems (ICISS).
[9] Aiman Majid Nassar,et al. The Internet of Things - A Survey , 2018, مؤتمرات الآداب والعلوم الانسانية والطبيعية.
[10] François Carrez,et al. Designing IoT architecture(s): A European perspective , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[11] Shiju Satyadevan,et al. Security, Trust and Implementation Limitations of Prominent IoT Platforms , 2014, FICTA.
[12] Carsten Bormann,et al. The Constrained Application Protocol (CoAP) , 2014, RFC.