Secure Service Proxy: A CoAP(s) Intermediary for a Securer and Smarter Web of Things
暂无分享,去创建一个
[1] Stefano Chessa,et al. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..
[2] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[3] Zach Shelby,et al. Constrained RESTful Environments (CoRE) Link Format , 2012, RFC.
[4] Elaine B. Barker. Recommendation for Key Management, Part 1: General , 2016 .
[5] Salvatore Loreto,et al. Guidelines for Mapping Implementations: HTTP to the Constrained Application Protocol (CoAP) , 2017, RFC.
[6] David A. McGrew,et al. AES-CCM Cipher Suites for Transport Layer Security (TLS) , 2012, RFC.
[7] Anna Calveras Augé,et al. A Proxy Design to Leverage the Interconnection of CoAP Wireless Sensor Networks with Web Applications , 2015, Sensors.
[8] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[9] Hannes Tschofenig,et al. Internet Engineering Task Force (ietf) Using Raw Public Keys in Transport Layer Security (tls) and Datagram Transport Layer Security (dtls) , 2022 .
[10] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[11] K. Kuladinithi,et al. Implementation of CoAP and its Application in Transport Logistics , 2011 .
[12] Carsten Bormann,et al. Terminology for Constrained-Node Networks , 2014, RFC.
[13] Enzo Mingozzi,et al. CoAP Proxy Virtualization for the Web of Things , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.
[14] Klaus Wehrle,et al. Delegation-based authentication and authorization for the IP-based Internet of Things , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[15] Hannes Tschofenig,et al. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS) , 2005, RFC.
[16] Luigi Atzori,et al. The Virtual Object as a Major Element of the Internet of Things: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[17] David A. McGrew,et al. AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS , 2014, RFC.
[18] Antonio Iera,et al. A CoAP-compliant solution for efficient inclusion of RFID in the Internet of Things , 2014, 2014 IEEE Global Communications Conference.
[19] Hannes Tschofenig,et al. Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things , 2016, RFC.
[20] Namhi Kang,et al. IoT–Cloud collaboration to establish a secure connection for lightweight devices , 2017, Wirel. Networks.
[21] David A. McGrew,et al. An Interface and Algorithms for Authenticated Encryption , 2008, RFC.
[22] Óscar García-Morchón,et al. Securing the IP-based internet of things with HIP and DTLS , 2013, WiSec '13.
[23] Eric Rescorla,et al. Datagram Transport Layer Security Version 1.2 , 2012, RFC.
[24] Antonio F. Gómez-Skarmeta,et al. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6) , 2013, Sensors.
[25] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[26] Simon Mayer,et al. Moving Application Logic from the Firmware to the Cloud: Towards the Thin Server Architecture for the Internet of Things , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[27] Utz Roedig,et al. Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[28] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[29] Klaus Hartke,et al. Observing Resources in the Constrained Application Protocol (CoAP) , 2015, RFC.
[30] Enzo Mingozzi,et al. Efficient proxying of CoAP observe with quality of service support , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).
[31] Ingrid Moerman,et al. Secure communication in IP-based wireless sensor networks via a trusted gateway , 2015, 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[32] Andrzej Duda,et al. DTLS performance in duty-cycled networks , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).