An Integrated Framework for Evaluating the Security Solutions to IP-Based IoT Applications
暂无分享,去创建一个
[1] Master Thesis,et al. Leveraging Public-key-based Authentication for the Internet of Things , 2013 .
[2] Shahid Raza,et al. Lightweight Security Solutions for the Internet of Things , 2013 .
[3] Jeffrey M. Voas,et al. Imagineering an Internet of Anything , 2014, Computer.
[4] Klaus Wehrle,et al. Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..
[5] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[6] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[7] Peter I. Corke,et al. Toward trusted wireless sensor networks , 2010, TOSN.
[8] Óscar García-Morchón,et al. Securing the IP-based internet of things with HIP and DTLS , 2013, WiSec '13.
[9] Giovanni Pau,et al. Wireless Sensor Networks to Improve Road Monitoring , 2012 .
[10] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[11] Riccardo Bonetto,et al. Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[12] Georg Carle,et al. DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.
[13] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[14] Carsten Bormann,et al. Terminology for Constrained-Node Networks , 2014, RFC.
[15] Hanno Wirtz,et al. Tailoring end-to-end IP security protocols to the Internet of Things , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).
[16] Klaus Wehrle,et al. Delegation-based authentication and authorization for the IP-based Internet of Things , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).