-
1
-
-
84861534112
-
Compression format for ipv6 datagrams over ieee 802.15.4-based networks
-
(ISSN: 2070-1721), Sept.
-
J. W. Hui and P. Thubert, "Compression format for ipv6 datagrams over ieee 802.15.4-based networks." IETF Proposed Standard, (ISSN: 2070-1721) Available [Online] http://tools.ietf.org/html/rfc6282, Sept. 2011.
-
(2011)
IETF Proposed Standard
-
-
Hui, J.W.1
Thubert, P.2
-
2
-
-
84866949605
-
Internet of things strategic research roadmap
-
O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, I. S. Jubert, M. Mazura, M. Harrison, M. Eisenhauer, et al., "Internet of things strategic research roadmap," Internet of Things-Global Technological and Societal Trends, pp. 9-52, 2011.
-
(2011)
Internet of Things-Global Technological and Societal Trends
, pp. 9-52
-
-
Vermesan, O.1
Friess, P.2
Guillemin, P.3
Gusmeroli, S.4
Sundmaeker, H.5
Bassi, A.6
Jubert, I.S.7
Mazura, M.8
Harrison, M.9
Eisenhauer, M.10
-
3
-
-
84877727033
-
The internet of things: How the next evolution of the internet is changing everything
-
D. Evans, "The internet of things: How the next evolution of the internet is changing everything," CISCO white paper, 2011.
-
(2011)
CISCO White Paper
-
-
Evans, D.1
-
4
-
-
84891702697
-
-
European project-"enabling the business-based internet of things and services", Accessed May 2013.
-
"European project-"enabling the business-based internet of things and services"." website [Online] http://www.ebbits-project.eu/ news.php, Accessed May 2013.
-
-
-
-
5
-
-
85037175440
-
Wireless sensor network security: A survey
-
J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless sensor network security: A survey," Security in distributed, grid, mobile, and pervasive computing, vol. 1, p. 367, 2007.
-
(2007)
Security in Distributed, Grid, Mobile, and Pervasive Computing
, vol.1
, pp. 367
-
-
Walters, J.P.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
-
6
-
-
38349154579
-
Denial-of-service in wireless sensor networks: Attacks and defenses
-
D. R. Raymond and S. F. Midkiff, "Denial-of-service in wireless sensor networks: Attacks and defenses," Pervasive Computing, IEEE, vol. 7, no. 1, pp. 74-81, 2008.
-
(2008)
Pervasive Computing, IEEE
, vol.7
, Issue.1
, pp. 74-81
-
-
Raymond, D.R.1
Midkiff, S.F.2
-
7
-
-
84988272488
-
Security considerations in the ip-based internet of things
-
Mar
-
O. Garcia-Morchon, S. Kumar, R. Struik, S. Keoh, and R. Hummen, "Security considerations in the ip-based internet of things." IETF (work in progress) Available [Online] http://tools.ietf.org/html/draft- garciacore-security-05, Mar. 2013.
-
(2013)
IETF (Work in Progress)
-
-
Garcia-Morchon, O.1
Kumar, S.2
Struik, R.3
Keoh, S.4
Hummen, R.5
-
8
-
-
83555176391
-
Security challenges in the ip-based internet of things
-
T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar, and K. Wehrle, "Security challenges in the ip-based internet of things," Wireless Personal Communications, vol. 61, no. 3, pp. 527-542, 2011.
-
(2011)
Wireless Personal Communications
, vol.61
, Issue.3
, pp. 527-542
-
-
Heer, T.1
Garcia-Morchon, O.2
Hummen, R.3
Keoh, S.L.4
Kumar, S.S.5
Wehrle, K.6
-
9
-
-
51249087814
-
Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks
-
IEEE
-
A. Liu and P. Ning, "Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks," in Information Processing in Sensor Networks, 2008. IPSN'08. International Conference on, pp. 245-256, IEEE, 2008.
-
(2008)
Information Processing in Sensor Networks, 2008. IPSN'08. International Conference on
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
10
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
ACM
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: a link layer security architecture for wireless sensor networks," in Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 162-175, ACM, 2004.
-
(2004)
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
11
-
-
78650756028
-
Contikisec: A secure network layer for wireless sensor networks under the contiki operating system
-
Springer
-
L. Casado and P. Tsigas, "Contikisec: A secure network layer for wireless sensor networks under the contiki operating system," in Identity and Privacy in the Internet Age, pp. 133-147, Springer, 2009.
-
(2009)
Identity and Privacy in the Internet Age
, pp. 133-147
-
-
Casado, L.1
Tsigas, P.2
-
12
-
-
59649125973
-
Effects of denial-of-sleep attacks on wireless sensor network mac protocols
-
D. R. Raymond, R. Marchany, M. Brownfield, and S. Midkiff, "Effects of denial-of-sleep attacks on wireless sensor network mac protocols," Vehicular Technology, IEEE Transactions on, vol. 58, no. 1, pp. 367-380, 2009.
-
(2009)
Vehicular Technology, IEEE Transactions on
, vol.58
, Issue.1
, pp. 367-380
-
-
Raymond, D.R.1
Marchany, R.2
Brownfield, M.3
Midkiff, S.4
-
14
-
-
84871266331
-
Rpl: Ipv6 routing protocol for low-power and lossy networks
-
Mar
-
T. Winter, "Rpl: Ipv6 routing protocol for low-power and lossy networks." IETF RFC 6550, Available [Online], http://tools.ietf.org/html/ rfc6550, Mar. 2012.
-
(2012)
IETF RFC 6550
-
-
Winter, T.1
-
15
-
-
0036793924
-
Denial of service in sensor networks
-
A. Wood and J. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, no. 10, pp. 54-62, 2002.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.2
-
17
-
-
70449633122
-
Security analysis survey and framework design for ip connected lowpans
-
IEEE
-
R. Riaz, K.-H. Kim, and H. Ahmed, "Security analysis survey and framework design for ip connected lowpans," in Autonomous Decentralized Systems, 2009. ISADS'09. International Symposium on, pp. 1-6, IEEE, 2009.
-
(2009)
Autonomous Decentralized Systems, 2009. ISADS'09. International Symposium on
, pp. 1-6
-
-
Riaz, R.1
Kim, K.-H.2
Ahmed, H.3
-
18
-
-
84856348082
-
Specification-based IDS for securing RPL from topology attacks
-
A. Le, J. Loo, and Y. Luo, "Specification-based IDS for securing RPL from topology attacks," Wireless Days (WD), 2011, pp. 4-6, 2011.
-
(2011)
Wireless Days (WD), 2011
, pp. 4-6
-
-
Le, A.1
Loo, J.2
Luo, Y.3
-
19
-
-
84865658341
-
6lowpan: A study on qos security threats and countermeasures using intrusion detection system approach
-
A. Le, J. Loo, A. Lasebae, M. Aiash, and Y. Luo, "6lowpan: a study on qos security threats and countermeasures using intrusion detection system approach," International Journal of Communication Systems, vol. 25, no. 9, pp. 1189-1212, 2012.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.9
, pp. 1189-1212
-
-
Le, A.1
Loo, J.2
Lasebae, A.3
Aiash, M.4
Luo, Y.5
-
20
-
-
85015054943
-
Security bootstrapping solution for resource-constrained devices
-
Nov
-
R. Cragie, Y. Ohba, R. Moskowitz, Z. Cao, and B. Sarikaya, "Security bootstrapping solution for resource-constrained devices." IETF (work in progress) Available [Online] http://tools.ietf.org/html/draft-oflynn- corebootstrapping-03, Nov. 2010.
-
(2010)
IETF (Work in Progress)
-
-
Cragie, R.1
Ohba, Y.2
Moskowitz, R.3
Cao, Z.4
Sarikaya, B.5
-
21
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A survey of key management schemes in wireless sensor networks," Computer communications, vol. 30, no. 11, pp. 2314-2341, 2007.
-
(2007)
Computer Communications
, vol.30
, Issue.11
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
22
-
-
73349090552
-
Intrusion detection systems for wireless sensor networks: A survey
-
Springer
-
A. H. Farooqi and F. A. Khan, "Intrusion detection systems for wireless sensor networks: A survey," in Communication and networking, pp. 234-241, Springer, 2009.
-
(2009)
Communication and Networking
, pp. 234-241
-
-
Farooqi, A.H.1
Khan, F.A.2
-
23
-
-
77954316597
-
Intrusion detection techniques in sensor networks
-
ed. J. Lopez and J. Zhou
-
A. Mitrokotsa and A. Karygiannis, "Intrusion detection techniques in sensor networks," Wireless Sensor Network Security, ed. J. Lopez and J. Zhou, pp. 251-272, 2008.
-
(2008)
Wireless Sensor Network Security
, pp. 251-272
-
-
Mitrokotsa, A.1
Karygiannis, A.2
-
25
-
-
70849118379
-
Rides: Robust intrusion detection system for ip-based ubiquitous sensor networks
-
S. O. Amin, M. S. Siddiqui, C. S. Hong, and S. Lee, "Rides: Robust intrusion detection system for ip-based ubiquitous sensor networks," Sensors, vol. 9, no. 5, pp. 3447-3468, 2009.
-
(2009)
Sensors
, vol.9
, Issue.5
, pp. 3447-3468
-
-
Amin, S.O.1
Siddiqui, M.S.2
Hong, C.S.3
Lee, S.4
-
26
-
-
84869790242
-
Novel, hybrid intrusion detection system for clustered wireless sensor network
-
July, 2011
-
H. Sedjelmaci and M. Feham, "Novel, Hybrid Intrusion Detection System for Clustered Wireless Sensor Network," International Journal of Network Security &Its Applications (IJNSA), Vol.3, No.4, July 2011, vol. 3, no. 4, pp. 1-14, 2011.
-
(2011)
International Journal of Network Security &Its Applications (IJNSA)
, vol.3
, Issue.4
, pp. 1-14
-
-
Sedjelmaci, H.1
Feham, M.2
-
27
-
-
78049343135
-
Energy efficient hybrid intrusion detection system for wireless sensor networks
-
Aug
-
A. Abduvaliyev, S. Lee, and Y.-K. Lee, "Energy efficient hybrid intrusion detection system for wireless sensor networks," 2010 International Conference on Electronics and Information Engineering, vol. 2, pp. V2-25-V2-29, Aug. 2010.
-
(2010)
2010 International Conference on Electronics and Information Engineering
, vol.2
-
-
Abduvaliyev, A.1
Lee, S.2
Lee, Y.-K.3
-
28
-
-
78149468870
-
An experimental study of hierarchical intrusion detection for wireless industrial sensor networks
-
Nov
-
Sooyeon Shin, Taekyoung Kwon, Gil-Yong Jo, Youngman Park, and H. Rhy, "An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks," IEEE Transactions on Industrial Informatics, vol. 6, pp. 744-757, Nov. 2010.
-
(2010)
IEEE Transactions on Industrial Informatics
, vol.6
, pp. 744-757
-
-
Shin, S.1
Kwon, T.2
Jo, G.-Y.3
Park, Y.4
Rhy, H.5
-
29
-
-
77953756374
-
Frequency agility in ipv6-based wireless personal area networks (6lowpan)
-
(E. Osipov, A. Kassler, T. Bohnert, and X. Masip-Bruin, eds.) 6074 of Lecture Notes in Computer Science, Springer Berlin Heidelberg,.
-
R. Tomasi, H. Khaleel, F. Penna, C. Pastrone, R. Garello, and M. Spirito, "Frequency agility in ipv6-based wireless personal area networks (6lowpan)," in Wired/Wireless Internet Communications (E. Osipov, A. Kassler, T. Bohnert, and X. Masip-Bruin, eds.), vol. 6074 of Lecture Notes in Computer Science, pp. 146-157, Springer Berlin Heidelberg, 2010.
-
(2010)
Wired/Wireless Internet Communications
, pp. 146-157
-
-
Tomasi, R.1
Khaleel, H.2
Penna, F.3
Pastrone, C.4
Garello, R.5
Spirito, M.6
-
30
-
-
84903616052
-
Meta-exploitation of ipv6-based wireless sensor networks
-
(Gjøvik-Norway)
-
R. Tomasi, L. Bruno, C. Pastrone, and M. Spirito, "Meta-exploitation of ipv6-based wireless sensor networks," in 3rd international workshop on Security and Communication Networks-IWSCN, (Gjøvik-Norway), 2011.
-
(2011)
3rd International Workshop on Security and Communication Networks-IWSCN
-
-
Tomasi, R.1
Bruno, L.2
Pastrone, C.3
Spirito, M.4
-
31
-
-
84891695256
-
-
Suricata-The Next Generation Intrusion Detection System, Accessed May 2013.
-
"Suricata-The Next Generation Intrusion Detection System." [Online] http://www.openinfosecfoundation.org, Accessed May 2013.
-
-
-
-
32
-
-
84891723096
-
-
Contiki, the open source os for the internet of things, Accessed May 2013.
-
"Contiki, the open source os for the internet of things." [Online] http://www.contiki-os.org/, Accessed May 2013.
-
-
-
|