-
2
-
-
79960408982
-
The visions, technologies, applications and security issues of Internet of Things
-
Shanghai, China
-
Shen G, Liu B,. The visions, technologies, applications and security issues of Internet of Things. International Conference on E -Business and E -Government (ICEE), Shanghai, China, 2011; 1-4.
-
(2011)
International Conference on e -Business and e -Government (ICEE)
, pp. 1-4
-
-
Shen, G.1
Liu, B.2
-
4
-
-
77956877124
-
The Internet of Things: A survey
-
Atzori L, Iera A, Morabito G,. The Internet of Things: A survey. Computer Network 2010; 54 (15): 2787-2805.
-
(2010)
Computer Network
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
5
-
-
84865631941
-
-
ITU Internet Reports 2005: The Internet of Things
-
ITU Internet Reports 2005: The Internet of Things. (Available form: http://www.itu.int/osg/spu/publications/internetofthings/).
-
-
-
-
6
-
-
79956038083
-
Research on the architecture of trusted security system based on the Internet of Things
-
Shenzhen, Guangdong
-
Xiong L, Zhou X, Liu W,. Research on the architecture of trusted security system based on the Internet of Things. 2011 International Conference on Intelligent Computation Technology and Automation (ICICTA), Shenzhen, Guangdong, 2011; 1172-1175.
-
(2011)
2011 International Conference on Intelligent Computation Technology and Automation (ICICTA)
, pp. 1172-1175
-
-
Xiong, L.1
Zhou, X.2
Liu, W.3
-
7
-
-
55849087276
-
Protection against packet fragmentation attacks at 6LoWPAN adaptation layer
-
ICHIT '08, Daejeon
-
Kim H,. Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. Convergence and Hybrid Information Technology, ICHIT '08, Daejeon, 2008; 796-801.
-
(2008)
Convergence and Hybrid Information Technology
, pp. 796-801
-
-
Kim, H.1
-
15
-
-
84964958468
-
-
Winter T, Thubert P, Brandt A, Clausen T, Hui J, Kelsey R, Levis P, Pister K, Struik R, Vasseur JP,. RPL: IPv6 Routing Protocol for Low power and Lossy Networks-draft-ietf-roll-rpl-19, 2011. (Available from: http://tools.ietf.org/html/draft-ietf-roll-rpl-19).
-
(2011)
RPL: IPv6 Routing Protocol for Low Power and Lossy Networks - draft-ietf-roll-rpl-19
-
-
Winter, T.1
Thubert, P.2
Brandt, A.3
Clausen, T.4
Hui, J.5
Kelsey, R.6
Levis, P.7
Pister, K.8
Struik, R.9
Vasseur, J.P.10
-
17
-
-
11144340927
-
Designing secure sensor networks
-
DOI 10.1109/MWC.2004.1368895
-
Shi E, Perrig A,. Designing secure sensor networks. IEEE Wireless Communications 2004; 11 (6): 38-43. (Pubitemid 40021188)
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
18
-
-
36749077485
-
A study of a routing attack in OLSR-based mobile ad hoc networks
-
DOI 10.1002/dac.870
-
Kannhavong B, Nakayama H, Kato N, Jamalipour A, Nemoto Y,. A study of a routing attack in OLSR-based mobile ad hoc networks. International Journal of Communication Systems 2007; 20 (11): 1245-1261. (Pubitemid 350207902)
-
(2007)
International Journal of Communication Systems
, vol.20
, Issue.11
, pp. 1245-1261
-
-
Kannhavong, B.1
Nakayama, H.2
Kato, N.3
Jamalipour, A.4
Nemoto, Y.5
-
20
-
-
67649560482
-
Integrating wireless sensor networks and the Internet: A security analysis
-
Roman R, Lopez J,. Integrating wireless sensor networks and the Internet: a security analysis. Internet Research 2009; 19 (2): 246-259.
-
(2009)
Internet Research
, vol.19
, Issue.2
, pp. 246-259
-
-
Roman, R.1
Lopez, J.2
-
21
-
-
70350440685
-
Attack model and detection scheme for Botnet on 6LoWPAN
-
Springer-Verlag: Jeju, South Korea
-
Cho EJ, Kim JH, Hong CS,. Attack model and detection scheme for Botnet on 6LoWPAN. Proceedings of the 12th Asia-Pacific Network Operations and Management Conference on Management Enabling the Future Internet for Changing Business and New Computing Services, Springer-Verlag: Jeju, South Korea, 2009; 515-518.
-
(2009)
Proceedings of the 12th Asia-Pacific Network Operations and Management Conference on Management Enabling the Future Internet for Changing Business and New Computing Services
, pp. 515-518
-
-
Cho, E.J.1
Kim, J.H.2
Hong, C.S.3
-
22
-
-
51249107460
-
-
Kushalnagar N, Montenegro G, Schumacher C,. RFC 4919: IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals, 2007. (Available from: http://tools.ietf.org/html/rfc4919) .
-
(2007)
RFC 4919: IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals
-
-
Kushalnagar, N.1
Montenegro, G.2
Schumacher, C.3
-
23
-
-
84959275167
-
Optimization of public key cryptography (RSA and ECC) for 8-bits devices based on 6LoWPAN
-
Tokyo, Japan
-
Ayuso J, Marin L, Jara A, Skarmeta AFG, Ayuso J,. Optimization of public key cryptography (RSA and ECC) for 8-bits devices based on 6LoWPAN. 1st International Workshop on the Security of the Internet of Things (SecIoT'10), Tokyo, Japan, 2010.
-
(2010)
1st International Workshop on the Security of the Internet of Things (SecIoT'10)
-
-
Ayuso, J.1
Marin, L.2
Jara, A.3
Skarmeta, A.F.G.4
Ayuso, J.5
-
24
-
-
84860483528
-
Efficient and side-channel resistant RSA implementation for 8-bit AVR microcontrollers
-
Tokyo, Japan
-
Liu Z, Groszschaedl J, Kizhvatov I,. Efficient and side-channel resistant RSA implementation for 8-bit AVR microcontrollers. 1st International Workshop on the Security of the Internet of Things (SecIoT'10), Tokyo, Japan, 2010.
-
(2010)
1st International Workshop on the Security of the Internet of Things (SecIoT'10)
-
-
Liu, Z.1
Groszschaedl, J.2
Kizhvatov, I.3
-
26
-
-
32144435943
-
Decentralized intrusion detection in wireless sensor networks
-
DOI 10.1145/1089761.1089765, Q2SWinet'05 - Proceedings of the First ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks
-
da Silva APR, Martins MHT, Rocha BPS, Loureiro AAF, Ruiz LB, Wong HC,. Decentralized intrusion detection in wireless sensor networks. 1st ACM International Workshop on Quality of Service; Security in Wireless and Mobile Networks, Montreal, Quebec, Canada, 2005; 16-23. (Pubitemid 43206617)
-
(2005)
Q2SWinet'05 - Proceedings of the First ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks
, pp. 16-23
-
-
Da Silva, A.P.R.1
Loureiro, A.A.F.2
Martins, M.H.T.3
Ruiz, L.B.4
Rocha, B.P.S.5
Wong, H.C.6
-
28
-
-
84865656166
-
Chapter 6. Intrusion detection in wireless sensor networks
-
In, Xiao Y. (ed.). Auerbach Publication: Boca Raton, New York
-
Amini F, Mǐsíc VB, Mǐsíc J,. Chapter 6. Intrusion detection in wireless sensor networks. In Security in Distributed, Grid, Mobile, and Pervasive Computing, Xiao Y, (ed.). Auerbach Publication: Boca Raton, New York, 2007; 111-128.
-
(2007)
Security in Distributed, Grid, Mobile, and Pervasive Computing
, pp. 111-128
-
-
Amini, F.1
Mǐsíc, V.B.2
Mǐsíc, J.3
-
29
-
-
84865647884
-
Hierarchical and low-power IPv6 address configuration for wireless sensor networks
-
Wang X, Qian H,. Hierarchical and low-power IPv6 address configuration for wireless sensor networks. International Journal of Communication Systems 2011: 1099-1131.
-
(2011)
International Journal of Communication Systems
, pp. 1099-1131
-
-
Wang, X.1
Qian, H.2
-
30
-
-
77951474836
-
A novel intrusion detection framework for IP-based sensor networks
-
IEEE Press: Chiang Mai, Thailand
-
Amin SO, Young Yj, Siddiqui MS, Hong CS,. A novel intrusion detection framework for IP-based sensor networks. Proceedings of the 23rd International Conference on Information Networking, IEEE Press: Chiang Mai, Thailand, 2009; 285-287.
-
(2009)
Proceedings of the 23rd International Conference on Information Networking
, pp. 285-287
-
-
Amin, S.O.1
Young, Y.2
Siddiqui, M.S.3
Hong, C.S.4
-
31
-
-
80052252486
-
A semantic-based intrusion detection framework for wireless sensor network
-
Gyeongju, Korea (South)
-
Mao Y,. A semantic-based intrusion detection framework for wireless sensor network. 2010 6th International Conference on Networked Computing (INC), Gyeongju, Korea (South), 2010; 1-5.
-
(2010)
2010 6th International Conference on Networked Computing (INC)
, pp. 1-5
-
-
Mao, Y.1
-
34
-
-
84856673526
-
Fuzzy logic anomaly detection scheme for directed diffusion based sensor networks
-
Xian, China
-
Chi SH, Cho TH,. Fuzzy Logic Anomaly Detection Scheme for Directed Diffusion Based Sensor Networks. FSKD 2006, Xian, China, 2006; 725-734.
-
(2006)
FSKD 2006
, pp. 725-734
-
-
Chi, S.H.1
Cho, T.H.2
-
35
-
-
67549100215
-
Minimizing false alarms on intrusion detection for wireless sensor networks in realistic environments
-
Orlando, Florida
-
Parekh B, Cam H,. Minimizing false alarms on intrusion detection for wireless sensor networks in realistic environments. Military Communications Conference, Orlando, Florida, 2007; 1-7.
-
(2007)
Military Communications Conference
, pp. 1-7
-
-
Parekh, B.1
Cam, H.2
-
36
-
-
77950661084
-
Intrusion detection system based on payoff matrix for wireless sensor networks
-
Guilin China
-
Dong RS, Liu LL, Liu JM, Xu XL,. Intrusion detection system based on payoff matrix for wireless sensor networks. Genetic and Evolutionary Computing, Guilin China, 2009; 3-6.
-
(2009)
Genetic and Evolutionary Computing
, pp. 3-6
-
-
Dong, R.S.1
Liu, L.L.2
Liu, J.M.3
Xu, X.L.4
-
40
-
-
84865663155
-
Intrusion detection using a boosting ant colony based data miner
-
Tehran, Iran
-
Soroush E, Habibi J, Abadeh MS,. Intrusion detection using a boosting ant colony based data miner. Proceedings of the 11th International CSI Computer Conference, Tehran, Iran, 2006; 563-566.
-
(2006)
Proceedings of the 11th International CSI Computer Conference
, pp. 563-566
-
-
Soroush, E.1
Habibi, J.2
Abadeh, M.S.3
-
41
-
-
33745917688
-
-
2006 Intelligence and Security Informatics. Lecture Notes in Computer Science, 2006, Springer
-
Phuong TV, Hung LX, Cho SJ, Lee YK, Lee SY,. An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks, Intelligence and Security Informatics. Lecture Notes in Computer Science, 2006, Vol. 3975/2006, Springer, 2006.
-
(2006)
An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks
, vol.3975
-
-
Phuong, T.V.1
Hung, L.X.2
Cho, S.J.3
Lee, Y.K.4
Lee, S.Y.5
-
44
-
-
78651544367
-
Bayesian fusion algorithm for inferring trust in wireless sensor networks
-
Momani M,. Bayesian fusion algorithm for inferring trust in wireless sensor networks. Journal of Network 2010; 5 (7): 815-822.
-
(2010)
Journal of Network
, vol.5
, Issue.7
, pp. 815-822
-
-
Momani, M.1
-
46
-
-
79551622081
-
Feature selection: A hybrid approach based on selfadaptive ant colony and support vector machine
-
Wuhan, Hubei
-
Xiong W, Wang C,. Feature selection: A hybrid approach based on selfadaptive ant colony and support vector machine. International Conference on Computer Science and Software Engineering, Wuhan, Hubei, 2008; 751-754.
-
(2008)
International Conference on Computer Science and Software Engineering
, pp. 751-754
-
-
Xiong, W.1
Wang, C.2
-
47
-
-
51349133681
-
Detecting selective forwarding attacks in wireless sensor networks using support vector machines
-
ISSNIP 2007, Melbourne, Qld
-
Kaplantzis S, Shilton A, Mani N, Sekercioglu YA,. Detecting selective forwarding attacks in wireless sensor networks using support vector machines. 3rd International Conference on Intelligent Sensors, Sensor Networks and Information, 2007. ISSNIP 2007, Melbourne, Qld, 2007; 335-340.
-
(2007)
3rd International Conference on Intelligent Sensors, Sensor Networks and Information, 2007
, pp. 335-340
-
-
Kaplantzis, S.1
Shilton, A.2
Mani, N.3
Sekercioglu, Y.A.4
-
49
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
ACM: Washington, DC, USA
-
Sekar R, Gupta A, Frullo J, Shanbhag T, Tiwari A, Yang H, Zhou S,. Specification-based anomaly detection: a new approach for detecting network intrusions. Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM: Washington, DC, USA, 2002; 265-274.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 265-274
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
50
-
-
74149086366
-
On the symbiosis of specification-based and anomaly-based detection
-
Stakhanova N, Basu S, Wong J,. On the symbiosis of specification-based and anomaly-based detection. Computers & Security 2010; 29 (2010): 253-268.
-
(2010)
Computers & Security
, vol.29
, Issue.2010
, pp. 253-268
-
-
Stakhanova, N.1
Basu, S.2
Wong, J.3
-
51
-
-
84903836776
-
How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
-
Ning P, Sun K,. How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. Information Assurance Workshop, 2003, IEEE Systems, Man and Cybernetics Society North Carolina State, 2003; 60-67.
-
(2003)
Information Assurance Workshop, 2003, IEEE Systems, Man and Cybernetics Society North Carolina State
, pp. 60-67
-
-
Ning, P.1
Sun, K.2
-
52
-
-
4544342574
-
A specification-based intrusion detection system for AODV
-
New York
-
Tseng C-Y, Balasubramanyam P, Ko C, Limprasittiporn R, Rowe J, Levitt K,. A specification-based intrusion detection system for AODV. SASN '03 Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, New York, 2003; 125-134.
-
(2003)
SASN '03 Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 125-134
-
-
Tseng, C.-Y.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
-
53
-
-
84992172210
-
Evaluation of a specification-based intrusion detection system for AODV
-
Corfu, Greece
-
Grönkvist J, Hansson A, Sköld M,. Evaluation of a specification-based intrusion detection system for AODV. The Sixth Annual Mediterranean Ad Hoc Networking WorkShop, Corfu, Greece, 2007; 121-128.
-
(2007)
The Sixth Annual Mediterranean Ad Hoc Networking WorkShop
, pp. 121-128
-
-
Grönkvist, J.1
Hansson, A.2
Sköld, M.3
-
54
-
-
35248850385
-
A specification-based intrusion detection model for OLSR
-
Tseng CH, Song T, Balasubramanyam P, Ko C, Levitt KN,. A specification-based intrusion detection model for OLSR. Recent Advance in Intrusion Detection RAID 2005; 2005: 330-350.
-
(2005)
Recent Advance in Intrusion Detection RAID
, vol.2005
, pp. 330-350
-
-
Tseng, C.H.1
Song, T.2
Balasubramanyam, P.3
Ko, C.4
Levitt, K.N.5
-
55
-
-
33646178576
-
An EFSM-based intrusion detection system for ad hoc networks
-
2005 In, Springer-Verlag: Berlin Heidelberg
-
Orset J-M, Alcalde B, Cavalli A,. An EFSM-based intrusion detection system for ad hoc networks. In Lecture Notes in Computer Science, Vol. 3707/2005. Springer-Verlag: Berlin Heidelberg, 2005; 400-413.
-
(2005)
Lecture Notes in Computer Science
, vol.3707
, pp. 400-413
-
-
Orset, J.-M.1
Alcalde, B.2
Cavalli, A.3
-
56
-
-
46249127003
-
Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks
-
Mostarda L, Navarra A,. Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks. International Journal of Distributed Sensor Networks 2008; 4: 83-109.
-
(2008)
International Journal of Distributed Sensor Networks
, vol.4
, pp. 83-109
-
-
Mostarda, L.1
Navarra, A.2
|