Demo: Do Not Trust Your Neighbors! A Small IoT Platform Illustrating a Man-in-the-Middle Attack
暂无分享,去创建一个
Nora Cuppens-Boulahia | Frédéric Cuppens | Georgios Z. Papadopoulos | Renzo E. Navas | Hélène Le Bouder | F. Cuppens | N. Cuppens-Boulahia
[1] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[2] Carsten Bormann,et al. Terminology for Constrained-Node Networks , 2014, RFC.
[3] Jim Schaad,et al. CBOR Object Signing and Encryption (COSE) , 2017, RFC.
[4] V. S. Malemath,et al. Security attacks and secure routing protocols in RPL-based Internet of Things: Survey , 2017, 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI).