Rapidly Deployable IoT Architecture with Data Security: Implementation and Experimental Evaluation
暂无分享,去创建一个
[1] Wei Dong,et al. Towards rapid and cost-effective prototyping of IoT platforms , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).
[2] Kumar Yelamarthi,et al. Sensing and classifying indoor environments: An Iot based portable tour guide system , 2017, 2017 IEEE Sensors Applications Symposium (SAS).
[3] Wei Dong,et al. Rapid development of IoT applications with TinyLink , 2017, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[4] Giancarlo Fortino,et al. Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.
[5] Rached Tourki,et al. Performance evaluation and design considerations of lightweight block cipher for low-cost embedded devices , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[6] Chong Kuan Chen,et al. IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.
[7] Yang Xiao,et al. MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..
[8] Jason Smith,et al. The SIMON and SPECK Families of Lightweight Block Ciphers , 2013, IACR Cryptol. ePrint Arch..
[9] K. Shadan,et al. Available online: , 2012 .
[10] Kumar Yelamarthi,et al. An Application-Driven Modular IoT Architecture , 2017, Wirel. Commun. Mob. Comput..
[11] Joseph Wang,et al. Tattoo‐Based Wearable Electrochemical Devices: A Review , 2015 .
[12] Emil Simion,et al. Innovative Security Solutions for Information Technology and Communications , 2015, Lecture Notes in Computer Science.
[13] Alex Biryukov,et al. State of the Art in Lightweight Symmetric Cryptography , 2017, IACR Cryptol. ePrint Arch..
[14] Kumar Yelamarthi,et al. How Does Encryption Influence Timing in IoT? , 2018, 2018 IEEE Global Conference on Internet of Things (GCIoT).
[15] Liter Siek,et al. Autonomous Wearable Sensor Nodes With Flexible Energy Harvesting , 2014, IEEE Sensors Journal.
[16] Nathalie Mitton,et al. Comparison of hardware and software based encryption for secure communication in wireless sensor networks , 2013, 2013 36th International Conference on Telecommunications and Signal Processing (TSP).
[17] Evangelos N. Gazis,et al. Short Paper: IoT: Challenges, projects, architectures , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.
[18] Tim Güneysu,et al. Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices , 2012, AFRICACRYPT.
[19] Sarmad Ullah Khan,et al. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.
[20] François Carrez,et al. Designing IoT architecture(s): A European perspective , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[21] R. Umarani,et al. A Survey on Various Most Common Encryption Techniques , 2012 .
[22] Giancarlo Fortino,et al. Agent-oriented modeling and simulation of IoT networks , 2016, 2016 Federated Conference on Computer Science and Information Systems (FedCSIS).
[23] Christof Paar,et al. A Survey of Lightweight-Cryptography Implementations , 2007, IEEE Design & Test of Computers.
[24] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[25] Konstantin Mikhaylov,et al. Analysis of Capacity and Scalability of the LoRa Low Power Wide Area Network Technology , 2016 .
[26] Prerna Mahajan,et al. A Study of Encryption Algorithms AES, DES and RSA for Security , 2013 .
[27] Nir Kshetri,et al. Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.
[28] Antonio F. Gómez-Skarmeta,et al. Performance Evaluation of LoRa Considering Scenario Conditions , 2018, Sensors.
[29] Christophe De Cannière,et al. KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers , 2009, CHES.
[30] M. F. A. L. Faisal,et al. The development of a data acqusition system based on internet of things framework , 2014, 2014 International Conference on ICT For Smart Society (ICISS).
[31] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[32] Patrick Schaumont,et al. SIMON Says: Break Area Records of Block Ciphers on FPGAs , 2014, IEEE Embedded Systems Letters.
[33] Fan Zhang,et al. On the security and energy consumption estimation of wireless sensor network protocols , 2012 .
[34] Antonio Pintus,et al. Paraimpu: a platform for a social web of things , 2012, WWW.
[35] Jos Wetzels,et al. Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher , 2016, IACR Cryptol. ePrint Arch..
[36] Monodeep Kar,et al. Energy Efficient and Side-Channel Secure Cryptographic Hardware for IoT-Edge Nodes , 2019, IEEE Internet of Things Journal.
[37] Mehmet Rasit Yuce,et al. WE-Safe: A wearable IoT sensor node for safety applications via LoRa , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).
[38] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[39] Valentin Cristea,et al. Evaluation of Lightweight Block Ciphers for Embedded Systems , 2015, SECITC.
[40] Alexander Wiesmaier,et al. Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared , 2016 .
[41] Masanobu Katagi,et al. The 128-Bit Blockcipher CLEFIA , 2007, RFC.
[42] Ahmadreza Tabesh,et al. A Low-Power Stand-Alone Adaptive Circuit for Harvesting Energy From a Piezoelectric Micropower Generator , 2010, IEEE Transactions on Industrial Electronics.
[43] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[44] Matti Siekkinen,et al. How low energy is bluetooth low energy? Comparative measurements with ZigBee/802.15.4 , 2012, 2012 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).
[45] Ali Chehab,et al. One round cipher algorithm for multimedia IoT devices , 2018, Multimedia Tools and Applications.
[46] Edith Beigné,et al. AES Datapath Optimization Strategies for Low-Power Low-Energy Multisecurity-Level Internet-of-Things Applications , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[47] Ahmed Khattab,et al. IoT-Based Health Monitoring System for Active and Assisted Living , 2016, GOODTECHS.
[48] Kevin Weekly,et al. Building-in-Briefcase: A Rapidly-Deployable Environmental Sensor Suite for the Smart Building , 2018, Sensors.
[49] Gourab Sen Gupta,et al. Multi-sensor integrated system for wireless monitoring of greenhouse environment , 2018, 2018 IEEE Sensors Applications Symposium (SAS).
[50] G. V. Vivek,et al. Enabling IOT services using WIFI - ZigBee gateway for a home automation system , 2015, 2015 IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).
[51] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[52] MengChu Zhou,et al. Modeling Opportunistic IoT Services in Open IoT Ecosystems , 2017, WOA.
[53] Stefano Chessa,et al. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..
[54] Carles Gomez,et al. Overview and Evaluation of Bluetooth Low Energy: An Emerging Low-Power Wireless Technology , 2012, Sensors.
[55] Kumar Yelamarthi,et al. A complete Internet of Things (IoT) platform for Structural Health Monitoring (SHM) , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).