메뉴 건너뛰기




Volumn , Issue , 2012, Pages 956-963

A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication

Author keywords

[No Author keywords available]

Indexed keywords

DATAGRAMS; END-TO-END SECURITY; ENGINEERING TECHNIQUES; INTERNET OF THING (IOT); INTERNET OF THINGS (IOT); INTERNET STANDARD; LOW OVERHEAD; LOW-POWER COMMUNICATION; LOWPOWER HARDWARE; SECURITY INFRASTRUCTURE; SECURITY SCHEME; SYSTEM ARCHITECTURES; TRANSPORT LAYER SECURITY; TWO WAYS;

EID: 84874293263     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LCNW.2012.6424088     Document Type: Conference Paper
Times cited : (140)

References (20)
  • 5
    • 38349154579 scopus 로고    scopus 로고
    • Denial-of-service in wireless sensor networks: Attacks and defenses
    • Jan.-Mar.
    • D. R. Raymond and S. F. Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," Pervasive Computing, vol. 7, no. 1, pp. 74-81, Jan.-Mar. 2008.
    • (2008) Pervasive Computing , vol.7 , Issue.1 , pp. 74-81
    • Raymond, D.R.1    Midkiff, S.F.2
  • 12
  • 20
    • 0036870095 scopus 로고    scopus 로고
    • Mica: A wireless platform for deeply embedded networks
    • Nov./Dec.
    • J. L. Hill and D. E. Culler, "Mica: A Wireless Platform for Deeply Embedded Networks," Micro, IEEE, vol. 22, no. 6, pp. 12-24, Nov./Dec. 2002.
    • (2002) Micro, IEEE , vol.22 , Issue.6 , pp. 12-24
    • Hill, J.L.1    Culler, D.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.