Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes
暂无分享,去创建一个
[1] Alexis Olivereau,et al. D-HIP: A distributed key exchange scheme for HIP-based Internet of Things , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[2] Ragib Hasan,et al. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.
[3] Antonio F. Gómez-Skarmeta,et al. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices , 2013, Sensors.
[4] James Gross,et al. In VANETs we trust?: characterizing RF jamming in vehicular networks , 2012, VANET@MOBICOM.
[5] Óscar García-Morchón,et al. Securing the IP-based internet of things with HIP and DTLS , 2013, WiSec '13.
[6] Giuseppe Piro,et al. Key Management Protocol with Implicit Certificates for IoT systems , 2015, IoT-Sys@MobiSys.
[7] Andrei V. Gurtov,et al. Two-phase authentication protocol for wireless sensor networks in distributed IoT applications , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[8] Alexis Olivereau,et al. HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things , 2012, Third International Conference on Communications and Networking.
[9] Anthony Skjellum,et al. Securing the Internet of Things: A Meta-Study of Challenges, Approaches, and Open Problems , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW).
[10] Mario Gerla,et al. Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[11] Bo Xu,et al. VCLT: An Accurate Trajectory Tracking Attack Based on Crowdsourcing in VANETs , 2015, ICA3PP.
[12] Kyung-Sup Kwak,et al. The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.
[13] Antonio F. Gómez-Skarmeta,et al. Towards a Lightweight Authentication and Authorization Framework for Smart Objects , 2014 .
[14] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[15] Rafael Marin-Lopez,et al. Lightweight CoAP-Based Bootstrapping Service for the Internet of Things , 2016, Sensors.
[16] Geir M. Køien,et al. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..
[17] Tai-hoon Kim,et al. A Review on Security in Smart Home Development , 2010 .
[18] Angelos D. Keromytis,et al. From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television , 2014, USENIX Security Symposium.
[19] Klaus Wehrle,et al. Slimfit — A HIP DEX compression layer for the IP-based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[20] Georg Carle,et al. DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.