S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme
暂无分享,去创建一个
Muhammad Waqas | Ghulam Abbas | Muhammad Tanveer | Fazal Muhammad | Sunghwan Kim | Ziaul Haq Abbas | G. Abbas | M. Waqas | Sunghwan Kim | Z. Abbas | Fazal Muhammad | Muhammad Tanveer
[1] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[2] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[3] Utz Roedig,et al. Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[4] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[5] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[6] Jessye Dos Santos,et al. Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis , 2014, IEEE Internet of Things Journal.
[7] Weisong Shi,et al. On security challenges and open issues in Internet of Things , 2018, Future Gener. Comput. Syst..
[8] Yanli Li,et al. Green content communications in 6LoWPAN , 2020, IET Networks.
[9] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[10] Aref Meddeb,et al. 6LowPSec: An end-to-end security protocol for 6LoWPAN , 2018, Ad Hoc Networks.
[11] Avinash Sharma,et al. Security of 6LoWPAN IoT Networks in Hospitals for Medical Data Exchange , 2019 .
[12] Priyadarsi Nanda,et al. Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.
[13] Tero Kivinen,et al. More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE) , 2003, RFC.
[14] Ludwig Seitz,et al. S3K: Scalable Security With Symmetric Keys—DTLS Key Establishment for the Internet of Things , 2016, IEEE Transactions on Automation Science and Engineering.
[15] Pascal Thubert,et al. Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks , 2011, RFC.
[16] Ki-Hyung Kim,et al. SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN) , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).
[17] Maode Ma,et al. A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks , 2016, IEEE Transactions on Industrial Informatics.
[18] Ingrid Moerman,et al. IETF Standardization in the Field of the Internet of Things (IoT): A Survey , 2013, J. Sens. Actuator Networks.
[19] Devesh Pratap Singh,et al. Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges , 2020, IEEE Access.
[20] Kris Gaj,et al. Comparison of cost of protection against differential power analysis of selected authenticated ciphers , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[21] Carsten Bormann,et al. From 6LoWPAN to 6Lo: Expanding the Universe of IPv6-Supported Technologies for the Internet of Things , 2017, IEEE Communications Magazine.
[22] François-Xavier Standaert,et al. On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[23] Yi Mu,et al. Communication security and privacy support in 6LoWPAN , 2017, J. Inf. Secur. Appl..
[24] Manoel Camillo Penna,et al. SDN Architecture for 6LoWPAN Wireless Sensor Networks , 2018, Sensors.
[25] David E. Culler,et al. Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.
[26] Yacine Challal,et al. Security in device-to-device communications: a survey , 2018, IET Networks.
[27] Alexandre Adomnicai,et al. Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software , 2018, IACR Cryptol. ePrint Arch..
[28] Myung-Ki Shin,et al. Transmission of IPv6 Packets over IEEE 802.16 , 2006 .
[29] Dushantha Nalin K. Jayakody,et al. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions , 2020, IEEE Communications Surveys & Tutorials.
[30] Houbing Song,et al. Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures , 2019, IEEE Communications Surveys & Tutorials.
[31] Meng Chang Chen,et al. SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks , 2013, IEEE Systems Journal.
[32] Tiago Gomes,et al. A 6LoWPAN Accelerator for Internet of Things Endpoint Devices , 2018, IEEE Internet of Things Journal.