메뉴 건너뛰기




Volumn , Issue , 2012, Pages 220-225

Secure bootstrapping of nodes in a CoAP network

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROTOCOLS; CONSTRAINED DEVICES; HOME AUTOMATION; INPUT/OUTPUT DEVICES; INTERNET OF THINGS (IOT); LIGHT BULBS; PROCESSING POWER; SECURE COMMUNICATIONS; SECURE CONFIGURATION; SECURITY CREDENTIALS; SERVICE DISCOVERY; SMART OBJECTS;

EID: 84863698729     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCNCW.2012.6215494     Document Type: Conference Paper
Times cited : (13)

References (19)
  • 1
    • 80955160447 scopus 로고    scopus 로고
    • That 'Internet of Things' thing
    • Jun. 22 Available
    • K. Ashton. (2009, Jun. 22) That 'Internet of Things' thing. RFID Journal. [Online]. Available: http://www.rfidjournal.com/article/view/4986
    • (2009) RFID Journal. [Online]
    • Ashton, K.1
  • 4
    • 33746613037 scopus 로고    scopus 로고
    • RFC 4347 (Proposed Standard), Apr. [Online]. Available
    • E. Rescorla and N. Modadugu, "Datagram Transport Layer Security,"RFC 4347 (Proposed Standard), Internet Engineering Task Force, Apr. 2006. [Online]. Available: http://www.ietf.org/rfc/rfc4347.txt
    • (2006) Datagram Transport Layer Security
    • Rescorla, E.1    Modadugu, N.2
  • 5
    • 0003470642 scopus 로고    scopus 로고
    • RFC 4301 (Proposed Standard), Dec. [Online]. Available
    • S. Kent and K. Seo, "Security Architecture for the Internet Protocol,"RFC 4301 (Proposed Standard), Internet Engineering Task Force, Dec. 2005. [Online]. Available: http://www.ietf.org/rfc/rfc4301.txt
    • (2005) Security Architecture for the Internet Protocol
    • Kent, S.1    Seo, K.2
  • 12
    • 84863713198 scopus 로고    scopus 로고
    • Internet-Draft (work in progress), Jul. [Online]. Available
    • J. Arkko and A. Keranen, "CoAP Security Architecture,"Internet- Draft (work in progress), Jul. 2011. [Online]. Available: http://tools.ietf.org/ html/draft-arkko-core-security-arch
    • (2011) CoAP Security Architecture
    • Arkko, J.1    Keranen, A.2
  • 13
    • 84947251443 scopus 로고    scopus 로고
    • The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
    • Security Protocols, ser. B. Christianson, B. Crispo, J. Malcolm, and M. Roe, Eds. Springer Berlin / Heidelberg, [Online]. Available
    • F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks," in Security Protocols, ser. Lecture Notes in Computer Science, B. Christianson, B. Crispo, J. Malcolm, and M. Roe, Eds. Springer Berlin / Heidelberg, 2000, vol. 1796, pp. 172-182. [Online]. Available: http://dx.doi.org/10.1007/10720107 24
    • (2000) Lecture Notes in Computer Science , vol.1796 , pp. 172-182
    • Stajano, F.1    Anderson, R.2
  • 14
    • 0036999904 scopus 로고    scopus 로고
    • The Resurrecting Duckling: Security issues for ubiquitous computing
    • Apr.
    • -, "The Resurrecting Duckling: security issues for ubiquitous computing," Computer, vol. 35, no. 4, pp. 22-26, Apr. 2002.
    • (2002) Computer , vol.35 , Issue.4 , pp. 22-26
    • Stajano, F.1    Anderson, R.2
  • 15
    • 84863685896 scopus 로고    scopus 로고
    • Internet-Draft (work in progress), Mar. 7, [Online]. Available
    • C. Bormann, "CoRE Simple Server Discovery," Internet-Draft (work in progress), Mar. 7, 2011. [Online]. Available: http://tools.ietf.org/ html/draft-bormann-core-simple-server-discovery
    • (2011) CoRE Simple Server Discovery
    • Bormann, C.1
  • 16
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • June [Online]. Available
    • A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Commun. ACM, vol. 47, pp. 53-57, June 2004. [Online]. Available: http://doi.acm.org/10.1145/990680.990707
    • (2004) Commun. ACM , vol.47 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 17
    • 84863685897 scopus 로고    scopus 로고
    • Internet-Draft (work in progress), Jan. 27, [Online]. Available
    • C. O'Flynn, "Initial Configuration of Resource-Constrained Devices,"Internet-Draft (work in progress), Jan. 27, 2010. [Online]. Available: http://tools.ietf.org/html/draft-oflynn-6lowapp-bootstrapping
    • (2010) Initial Configuration of Resource-Constrained Devices
    • O'Flynn, C.1
  • 18
    • 78650911380 scopus 로고    scopus 로고
    • Internet-Draft (work in progress), Jul. [Online]. Available
    • Z. Shelby, "Constrained Application Protocol (CoAP)," Internet-Draft (work in progress), Jul. 2011. [Online]. Available: http://tools.ietf.org/html/draft-ietf-core-link-format
    • (2011) Constrained Application Protocol (CoAP)
    • Shelby, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.