메뉴 건너뛰기




Volumn , Issue , 2013, Pages 119-124

Securing the IP-based internet of things with HIP and DTLS

Author keywords

Design; Management; Performance; Security

Indexed keywords

HOST IDENTITY PROTOCOL; INTERNET OF THINGS (IOT); PERFORMANCE; REQUIRED FUNCTIONALITIES; SECURE COMMUNICATIONS; SECURITY; SECURITY ARCHITECTURE; TRANSPORT LAYER SECURITY;

EID: 84879546251     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2462096.2462117     Document Type: Conference Paper
Times cited : (74)

References (17)
  • 1
    • 84879518624 scopus 로고    scopus 로고
    • Adapted multimedia internet KEYing (AMIKEY): An extension of multimedia internet KEYing methods for generic LLN environments
    • R. Alexander and T. Tsao. Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing Methods for Generic LLN Environments. Internet-draft, IETF, 2012.
    • (2012) Internet-draft IETF
    • Alexander, R.1    Tsao, T.2
  • 3
    • 77956994208 scopus 로고    scopus 로고
    • SP-800-108, Computer Security Division. Information Technology Laboratory. US Department of Commerce
    • L. Chen. Recommendation for key derivation using pseudorandom functions. SP-800-108, Computer Security Division. Information Technology Laboratory. US Department of Commerce, 2009.
    • (2009) Recommendation for Key Derivation Using Pseudorandom Functions
    • Chen, L.1
  • 5
    • 36348983733 scopus 로고    scopus 로고
    • Pre-shared key ciphersuites for transport layer security (TLS)
    • December
    • P. Eronen and H. Tschofenig. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS). RFC 4279 (Proposed Standard), December 2005.
    • (2005) RFC 4279 (Proposed Standard)
    • Eronen, P.1    Tschofenig, H.2
  • 6
  • 7
    • 0036738266 scopus 로고    scopus 로고
    • Spins: Security protocols for sensor networks
    • A. Perrig et al. Spins: security protocols for sensor networks. Wireless Networks, 8(5), 2002.
    • (2002) Wireless Networks , vol.8 , Issue.5
    • Perrig, A.1
  • 9
    • 85028765277 scopus 로고
    • Perfectly-secure key distribution for dynamic conferences
    • C. Blundo et al. Perfectly-secure key distribution for dynamic conferences. Advances in cryptology, 1993.
    • (1993) Advances in Cryptology
    • Blundo, C.1
  • 10
    • 33645397066 scopus 로고    scopus 로고
    • MIKEY: Multimedia internet KEYing
    • August. Updated by RFCs 4738, 6309
    • J. Arkko et al. MIKEY: Multimedia Internet KEYing. RFC 3830, August 2004. Updated by RFCs 4738, 6309.
    • (2004) RFC 3830
    • Arkko, J.1
  • 11
    • 83055165076 scopus 로고    scopus 로고
    • Host identity protocol version 2 (HIPv2)
    • R. Moskowitz et al. Host Identity Protocol Version 2 (HIPv2). Internet-draft, IETF, 2012.
    • (2012) Internet-draft, IETF
    • Moskowitz, R.1
  • 12
    • 33645091897 scopus 로고    scopus 로고
    • Sizzle: A standards-based end-to-end security architecture for the embedded internet
    • V. Gupta et al. Sizzle: A standards-based end-to-end security architecture for the embedded internet.Pervasive and Mobile Computing, 1:425-445, 2005.
    • (2005) Pervasive and Mobile Computing , vol.1 , pp. 425-445
    • Gupta, V.1
  • 17
    • 35248893214 scopus 로고    scopus 로고
    • Datagram transport layer security
    • April, Obsoleted by RFC 6347, updated by RFC 5746
    • E. Rescorla and N. Modadugu. Datagram Transport Layer Security. RFC 4347, April 2006. Obsoleted by RFC 6347, updated by RFC 5746.
    • (2006) RFC 4347
    • Rescorla, E.1    Modadugu, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.