SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things
暂无分享,去创建一个
Panagiotis Papadimitratos | Thiemo Voigt | Shahid Raza | Tómas Helgason | Panos Papadimitratos | S. Raza | T. Voigt | Tómas Helgason
[1] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[2] Adam Dunkels,et al. A Low-Power CoAP for Contiki , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.
[3] Hannes Tschofenig,et al. Internet Engineering Task Force (ietf) Using Raw Public Keys in Transport Layer Security (tls) and Datagram Transport Layer Security (dtls) , 2022 .
[4] Hannes Tschofenig,et al. Transport Layer Security (TLS) Cached Information Extension , 2016, RFC.
[5] Jorge Sá Silva,et al. End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication , 2013, 2013 IFIP Networking Conference.
[6] Georg Carle,et al. A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.
[7] Hongming Cai,et al. An IoT-Oriented Data Storage Framework in Cloud Computing Platform , 2014, IEEE Transactions on Industrial Informatics.
[8] Khaled Masmoudi,et al. Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks , 2006, ESAS.
[9] Joakim Eriksson,et al. BSD-based elliptic curve cryptography for the open Internet of Things , 2015, 2015 7th International Conference on New Technologies, Mobility and Security (NTMS).
[10] Thiemo Voigt,et al. Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.
[11] Klaus Wehrle,et al. Delegation-based authentication and authorization for the IP-based Internet of Things , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[12] James B. D. Joshi,et al. IPv6 Security Challenges , 2009, Computer.
[13] Hanno Wirtz,et al. Tailoring end-to-end IP security protocols to the Internet of Things , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).
[14] Utz Roedig,et al. Fusion: coalesced confidential storage and communication framework for the IoT , 2016, Secur. Commun. Networks.
[15] Carsten Bormann,et al. The Constrained Application Protocol (CoAP) , 2014, RFC.
[16] Eric Rescorla,et al. Datagram Transport Layer Security Version 1.2 , 2012, RFC.
[17] Marco Tiloca,et al. On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake , 2017, International Journal of Information Security.
[18] Jürgen Falb,et al. The Internet Protocol , 2005, The Industrial Information Technology Handbook.
[19] Ludwig Seitz,et al. S3K: Scalable Security With Symmetric Keys—DTLS Key Establishment for the Internet of Things , 2016, IEEE Transactions on Automation Science and Engineering.
[20] Pascal Thubert,et al. Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks , 2011, RFC.
[21] Peter I. Corke,et al. secFleck: A Public Key Technology Platform for Wireless Sensor Networks , 2009, EWSN.
[22] Carsten Bormann,et al. Terminology for Constrained-Node Networks , 2014, RFC.
[23] Peter Saint-Andre,et al. Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS) , 2015, RFC.
[24] Matthias Kovatsch,et al. Californium: Scalable cloud services for the Internet of Things with CoAP , 2014, 2014 International Conference on the Internet of Things (IOT).
[25] Adam Dunkels,et al. Powertrace: Network-level Power Profiling for Low-power Wireless Networks , 2011 .