-
1
-
-
84871266331
-
RPL: IPv6 routing protocol for low-power and lossynetworks
-
Winter T., Thubert P., Brandt A., Hui J., Kelsey R., Levis P., Pister K., Struik R., Vasseur J., Alexander R., RPL: IPv6 routing protocol for low-power and lossynetworks. RFC March 2012 6550
-
(2012)
RFC
, Issue.6550
-
-
Winter, T.1
Thubert, P.2
Brandt, A.3
Hui, J.4
Kelsey, R.5
Levis, P.6
Pister, K.7
Struik, R.8
Vasseur, J.9
Alexander, R.10
-
2
-
-
70449596680
-
IPv6 over low-power wireless personalArea networks (6LoWPANs): Overview, assumptions, problem statement, and goals
-
Kushalnagar N., Montenegro G., Schumacher C., IPv6 over low-power wireless personalArea networks (6LoWPANs): overview, assumptions, problem statement, and goals. RFC 2007 4919
-
(2007)
RFC
, Issue.4919
-
-
Kushalnagar, N.1
Montenegro, G.2
Schumacher, C.3
-
3
-
-
80052447165
-
Securing communication in 6LoWPAN with compressed IPsec
-
June Barcelona, Spain 2-s2.0-80052447165 10.1109/DCOSS.2011.5982177
-
Raza S., Duquennoy S., Chung T., Yazar D., Voigt T., Roedig U., Securing communication in 6LoWPAN with compressed IPsec. Proceeding of the 7th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS '11) June 2011 Barcelona, Spain 2-s2.0-80052447165 10.1109/DCOSS.2011.5982177
-
(2011)
Proceeding of the 7th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS '11)
-
-
Raza, S.1
Duquennoy, S.2
Chung, T.3
Yazar, D.4
Voigt, T.5
Roedig, U.6
-
4
-
-
84884250012
-
-
Ad Hoc Networks
-
Kothmayr T., Schmitt C., Hu W., Brünig M., Carle G., DTLS Based Security and Twowayauthentication for the Internet of Things 2013 Ad Hoc Networks
-
(2013)
DTLS Based Security and Twowayauthentication for the Internet of Things
-
-
Kothmayr, T.1
Schmitt, C.2
Hu, W.3
Brünig, M.4
Carle, G.5
-
6
-
-
84867766892
-
-
Security and Communication Networks, John Wiley & Sons
-
Raza S., Duquennoy S., Höglund J., Roedig U., Voigt T., Secure Communication for the Internet of Things-A Comparison of Link- Layer Security and IPsec for 6LoWPAN 2012 Security and Communication Networks, John Wiley & Sons
-
(2012)
Secure Communication for the Internet of Things - A Comparison of Link- Layer Security and IPsec for 6LoWPAN
-
-
Raza, S.1
Duquennoy, S.2
Höglund, J.3
Roedig, U.4
Voigt, T.5
-
7
-
-
84863713348
-
-
March 2012
-
Garcia-Morchon O., Hummen R., Kumar S. S., Struik R., Keoh S. L., Security Considerations in the IP-based Internet of Things. March 2012
-
Security Considerations in the IP-based Internet of Things
-
-
Garcia-Morchon, O.1
Hummen, R.2
Kumar, S.S.3
Struik, R.4
Keoh, S.L.5
-
11
-
-
84861982926
-
Compression format for IPv6 datagrams over IEEE 802.15.4-basednetworks
-
Hui J., Thubert P., Compression format for IPv6 datagrams over IEEE 802.15.4-basednetworks. RFC 2011 6282
-
(2011)
RFC
, Issue.6282
-
-
Hui, J.1
Thubert, P.2
-
12
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
2-s2.0-2942656255 10.1016/S1570-8705(03)00008-8
-
Karlof C., Wagner D., Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 2003 1 2 293 315 2-s2.0-2942656255 10.1016/S1570-8705(03)00008-8
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
14
-
-
46149087550
-
Cross-level sensor network simulation with cooja
-
November IEEE 2-s2.0-46149087550 10.1109/LCN.2006.322172
-
Österlind F., Dunkels A., Eriksson J., Finne N., Voigt T., Cross-level sensor network simulation with cooja. Proceeding of the 31st Annual IEEE Conference on Local Computer Networks (LCN '06) November 2006 IEEE 641 648 2-s2.0-46149087550 10.1109/LCN.2006.322172
-
(2006)
Proceeding of the 31st Annual IEEE Conference on Local Computer Networks (LCN '06)
, pp. 641-648
-
-
Österlind, F.1
Dunkels, A.2
Eriksson, J.3
Finne, N.4
Voigt, T.5
-
18
-
-
84864217683
-
The ContikiMAC radio duty cycling protocol
-
Dunkels A., The ContikiMAC radio duty cycling protocol. SICS Technical Report 2011 T2011:13
-
(2011)
SICS Technical Report
-
-
Dunkels, A.1
-
20
-
-
24944466187
-
Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach
-
March 2-s2.0-24944466187
-
Lazos L., Poovendran R., Meadows C., Syverson P., Chang L. W., Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. 2 Proceeding of the IEEE Wireless Communications and Networking Conference (WCNC '05) March 2005 1193 1199 2-s2.0-24944466187
-
(2005)
Proceeding of the IEEE Wireless Communications and Networking Conference (WCNC '05)
, vol.2
, pp. 1193-1199
-
-
Lazos, L.1
Poovendran, R.2
Meadows, C.3
Syverson, P.4
Chang, L.W.5
-
23
-
-
77958513829
-
Internet control message protocol (ICMPv6) forthe internet protocol version 6 (IPv6) specification
-
Updated by RFC 488414
-
Conta A., Deering S., Gupta M., Internet control message protocol (ICMPv6) forthe internet protocol version 6 (IPv6) specification. RFC 2006 Updated by RFC 488414 4443 (Draft Standard)
-
(2006)
RFC
-
-
Conta, A.1
Deering, S.2
Gupta, M.3
|