Mitigating replay attacks with ZigBee solutions
暂无分享,去创建一个
[1] Maoheng Sun,et al. Study and Application of Security Based on ZigBee Standard , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.
[2] Yu-Wei Su,et al. A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi , 2007, IECON 2007 - 33rd Annual Conference of the IEEE Industrial Electronics Society.
[3] Xiaofeng Xue,et al. Application and Analysis of ZigBee Security Services Specification , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.
[4] Pekka Toivanen,et al. Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned , 2013, 2013 46th Hawaii International Conference on System Sciences.
[5] Uttam Ghosh,et al. Considering security for ZigBee protocol using message authentication code , 2015, 2015 Annual IEEE India Conference (INDICON).
[6] S. Sitharama Iyengar,et al. Fundamentals of Sensor Network Programming: Applications and Technology , 2010 .
[7] Bin Yang,et al. Study on Security of Wireless Sensor Network Based on ZigBee Standard , 2009, 2009 International Conference on Computational Intelligence and Security.
[8] Abdul-Rahman Al-Ali,et al. InfoPods: Zigbee-based remote information monitoring devices for smart-homes , 2009, IEEE Transactions on Consumer Electronics.
[9] Keijo Haataja,et al. Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned , 2014, 2014 14th International Conference on Hybrid Intelligent Systems.
[10] Drew Gislason,et al. Zigbee Wireless Networking , 2008 .
[11] Li Chunqing,et al. Research of ZigBee's Data Security and Protection , 2009, 2009 International Forum on Computer Science-Technology and Applications.
[12] Johnny Cache,et al. Hacking Exposed Wireless: Wireless Security Secrets & Solutions , 2007 .
[13] Cristina Alcaraz,et al. A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[14] Mihui Kim,et al. An enhanced key management using ZigBee Pro for wireless sensor networks , 2012, The International Conference on Information Network 2012.