On the Effectiveness of End-to-End Security for Internet-Integrated Sensing Applications
暂无分享,去创建一个
[1] David E. Culler,et al. Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.
[2] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[3] Daniel Minoli. IPv6 Over Low‐Power WPAN (6Lowpan) , 2013 .
[4] Ki-Hyung Kim,et al. IPv6 over Low Power WPAN Security Analysis , 2011 .
[5] Hannes Tschofenig,et al. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS) , 2005, RFC.
[6] Fernando Boavida,et al. Why is IPSec a viable option for wireless sensor networks , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[7] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[8] Carsten Bormann,et al. The Constrained Application Protocol (CoAP) , 2014, RFC.
[9] Eric Rescorla,et al. Datagram Transport Layer Security Version 1.2 , 2012, RFC.
[10] Jorge Sá Silva,et al. Enabling Network-Layer Security on IPv6 Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[11] David A. McGrew,et al. An Interface and Algorithms for Authenticated Encryption , 2008, RFC.