-
2
-
-
84894668409
-
Context aware computing for the Internet of Things: A survey
-
C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, "Context aware computing for the Internet of Things: A survey," IEEE Commun. Surv. Tuts., vol. 16, no. 1, pp. 414-454, 2014
-
(2014)
IEEE Commun. Surv. Tuts
, vol.16
, Issue.1
, pp. 414-454
-
-
Perera, C.1
Zaslavsky, A.2
Christen, P.3
Georgakopoulos, D.4
-
3
-
-
77956217277
-
Cyber-physical systems: The next computing revolution
-
R. Rajkumar, I. Lee, L. Sha, and J. Stankovik, "Cyber-physical systems: The next computing revolution," in Proc. 47th ACM/IEEE Des. Autom. Conf., 2010, pp. 731-736
-
(2010)
Proc. 47th ACM/ IEEE Des. Autom. Conf
, pp. 731-736
-
-
Rajkumar, R.1
Lee, I.2
Sha, L.3
Stankovik, J.4
-
4
-
-
84886711852
-
Supporting cyber physical systems with wireless sensor networks: An outlook of software and services
-
Online]. Available
-
P. Misra, L. Mottola, S. Raza, S. Duquennoy, and T. Voigt, "Supporting cyber physical systems with wireless sensor networks: An outlook of software and services," J. Indian Inst. Sci., vol. 93, no. 3, pp. 463-486, 2013 [Online]. Available: http://journal.library.iisc.ernet.in/index.php/ iisc/article/view/1670/3043
-
(2013)
J. Indian Inst. Sci
, vol.93
, Issue.3
, pp. 463-486
-
-
Misra, P.1
Mottola, L.2
Raza, S.3
Duquennoy, S.4
Voigt, T.5
-
6
-
-
84867555935
-
A study of protocol tack in 6LoWPAN model
-
Jul
-
N. H. A. Ismail, R. Hassan, and K. W. M. Ghazali, "A study of protocol tack in 6LoWPAN model," J. Theor. Appl. Inf. Technol., vol. 41, no. 2, pp. 220-229, Jul. 2012
-
(2012)
J. Theor. Appl. Inf. Technol
, vol.41
, Issue.2
, pp. 220-229
-
-
Ismail, N.H.A.1
Hassan, R.2
Ghazali, K.W.M.3
-
7
-
-
83555176391
-
Security challenges in the IP-based Internet of Things
-
Dec
-
T. Heer et al., "Security challenges in the IP-based Internet of Things," J. Wireless Personal Commun., vol. 61, no. 3, pp. 527-542, Dec. 2011
-
(2011)
J. Wireless Personal Commun
, vol.61
, Issue.3
, pp. 527-542
-
-
Heer, T.1
-
8
-
-
80052447165
-
Securing communication in 6LoWPAN with compressed IPsec
-
Barcelona, Spain, Jun
-
S. Raza et al., "Securing communication in 6LoWPAN with compressed IPsec," in Proc. 7th IEEE Int. Conf. Distrib. Comput. Sens. Syst. (DCOSS), Barcelona, Spain, Jun. 2011, pp. 1-8
-
(2011)
Proc. 7th IEEE Int. Conf. Distrib. Comput. Sens. Syst. (DCOSS
, pp. 1-8
-
-
Raza, S.1
-
9
-
-
84908456001
-
-
IEEE Standard for Local and Metropolitan Area Networks-802.15.4: Low Rate Wireless Personal Area Networks (LR-WPANs Sep
-
IEEE Standard for Local and Metropolitan Area Networks-802.15.4: Low Rate Wireless Personal Area Networks (LR-WPANs), IEEE Standard 802.15.4-2011, Sep. 2011
-
(2011)
IEEE Standard 802.15.4-2011
-
-
-
10
-
-
84904021864
-
-
IEEE Standard for Local and Metropolitan Area Networks-802.15.4: Low Rate Wireless Personal Area Networks, MAC Sub-Layer Apr
-
IEEE Standard for Local and Metropolitan Area Networks-802.15.4: Low Rate Wireless Personal Area Networks, MAC Sub-Layer, IEEE Standard 802.15.4e-2012, Amendment to IEEE Standard 802.15.4-2011, Apr. 2012
-
(2012)
IEEE Standard 802.15.4e-2012, Amendment to IEEE Standard 802.15.4-2011
-
-
-
11
-
-
84908400499
-
Updates to the IPv6 multicast addressing architecture
-
Sep. Online]. Available:
-
M. Boucadair and S. Venaas "Updates to the IPv6 multicast addressing architecture," IETF RFC 7371, Sep. 2014 [Online]. Available: http://tools.ietf.org/html/rfc7371
-
(2014)
IETF, RFC 7371
-
-
Boucadair, M.1
Venaas, S.2
-
12
-
-
28844461088
-
Deprecating site local addresses
-
Sep. Online]. Available:
-
C. Huitema and B. Carpenter "Deprecating site local addresses," IETF, RFC 3879, Sep. 2004 [Online]. Available: http://tools.ietf.org/html/ rfc3879
-
(2004)
IETF RFC
, vol.3879
-
-
Huitema, C.1
Carpenter, B.2
-
13
-
-
84883253704
-
Compression format for IPv6 datagrams over
-
Sep. Online]. Available:
-
J. Hui and P. Thubert "Compression format for IPv6 datagrams over IEEE 802.15.4-based networks," IETF, RFC 6282, Sep. 2011 [Online]. Available: https://tools.ietf.org/html/rfc6282
-
(2011)
IEEE 802.15.4-based Networks IETF, RFC 6282
-
-
Hui, J.1
Thubert, P.2
-
15
-
-
70449596680
-
Ipv6 over lowpower wireless personal area networks (6lowpans): Overview, assumptions, problem statement, and goals
-
Aug. Online]. Available:
-
N. Kushalnagar, G. Montenegro, and C. Schumacher, "IPv6 over lowpower wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals," IETF, RFC 4919, Aug. 2007 [Online]. Available: http://tools.ietf.org/html/rfc4919
-
(2007)
IETF, RFC
, vol.4919
-
-
Kushalnagar, N.1
Montenegro, G.2
Schumacher, C.3
-
16
-
-
0003068282
-
Security architecture for the Internet protocol
-
Nov. Online]. Available:
-
S. Kent and R. Atkinson, "Security architecture for the Internet protocol," IETF, RFC 2401, Nov. 1998 [Online]. Available: https://www.ietf.org/rfc/ rfc2401.txt
-
(1998)
IETF, RFC
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
17
-
-
80155190927
-
Internet key exchange protocol version 2 (IKEv2
-
Sep. Online]. Available:
-
C. Kaufman, P. Hoffman, Y. Nir, and P. Eronen, "Internet key exchange protocol version 2 (IKEv2)," IETF, RFC5996, Sep. 2010 [Online]. Available: https://www.ietf.org/rfc/rfc5996.txt
-
(2010)
IETF, RFC5996
-
-
Kaufman, C.1
Hoffman, P.2
Nir, Y.3
Eronen, P.4
-
18
-
-
84908400497
-
Lightweight IKEv2: A key management solution for both the compressed IPsec and the
-
Workshop SmartObject Secur., Paris, France, Mar
-
S. Raza, T. Voigt, and V. Jutvik, "Lightweight IKEv2: A key management solution for both the compressed IPsec and the IEEE 802.15.4 security," in Proc. Workshop SmartObject Secur., Paris, France, Mar. 2012
-
(2012)
IEEE 802.15.4 Security Proc
-
-
Raza, S.1
Voigt, T.2
Jutvik, V.3
-
19
-
-
84884992599
-
Securing internet of things with lightweight ipsec
-
Feb. Online]. Available:
-
S. Raza et al., "Securing Internet of Things with lightweight IPsec," Lancaster Univ., SICS Tech. Rep. T2010:08, Feb. 2011 [Online]. Available: http://soda.swedish-ict.se/4052/2/reportRevised.pdf
-
(2011)
Lancaster Univ., SICS Tech. Rep. T2010: 08
-
-
Raza, S.1
-
20
-
-
85015511461
-
Lightweight secure neighbor discovery protocol for low-power and lossy networks
-
S. Behcet and X. Yangsong, "Lightweight secure neighbor discovery protocol for low-power and lossy networks," Patent WO 2012044995 A1, 2012
-
(2012)
Patent WO 2012044995 A1
-
-
Behcet, S.1
Yangsong, X.2
-
21
-
-
84883120784
-
Datagram transport layer security version 1.2
-
Sep. Online]. Available:
-
E. Rescorla and N. Modadugu, "Datagram transport layer security version 1.2," IETF, RFC 6347, Sep. 2012 [Online]. Available: http://tools. ietf.org/html/rfc6347
-
(2012)
IETF, RFC 6347
-
-
Rescorla, E.1
Modadugu, N.2
-
22
-
-
84883314073
-
Lithe: Leightweight secure CoAP for the Internet of Things
-
Oct
-
S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: Leightweight secure CoAP for the Internet of Things," IEEE Sens. J., vol. 13, no. 10, pp. 3711-3720, Oct. 2013
-
(2013)
IEEE Sens. J
, vol.13
, Issue.10
, pp. 3711-3720
-
-
Raza, S.1
Shafagh, H.2
Hewage, K.3
Hummen, R.4
Voigt, T.5
-
23
-
-
84864199559
-
6Lowpan compressed dtls for coap
-
S. Raza, D. Trabalza, and T. Voigt, "6LoWPAN compressed DTLS for CoAP," in Proc. IEEE 8th Int. Conf. Distrib. Comput. Sens. Syst. (DCOSS), 2012, pp. 287-289
-
(2012)
Proc. IEEE 8th Int. Conf. Distrib. Comput. Sens. Syst. (DCOSS
, pp. 287-289
-
-
Raza, S.1
Trabalza, D.2
Voigt, T.3
-
24
-
-
84879548737
-
Towards viable certificate-based authentication for the internet of things
-
Budapest, Hungary, May 2013
-
R. Hummen, J. H. Ziegeldorf, H. Shafagh, S. Raza, and K. Wehrle, "Towards viable certificate-based authentication for the Internet of Things," in Proc. 6th ACM Conf. Secur. Privacy Wireless Mobile Netw. (WiSec13), Budapest, Hungary, May 2013, pp. 37-42
-
Proc. 6th ACM Conf. Secur. Privacy Wireless Mobile Netw. (WiSec13
, pp. 37-42
-
-
Hummen, R.1
Ziegeldorf, J.H.2
Shafagh, H.3
Raza, S.4
Wehrle, K.5
-
25
-
-
85051080089
-
-
draft-pritikin-comp-x509-00, May 2010 [Online]. Available:
-
D. McGrew and M. Pritikin, "The compressed X.509 certificate format," draft-pritikin-comp-x509-00, May 2010 [Online]. Available: http://tools.ietf.org/html/draft-pritikin-comp-x509-00
-
The Compressed X.509 Certificate Format
-
-
McGrew, D.1
Pritikin, M.2
-
26
-
-
84879533211
-
6LoWPAN fragmentation attacks and mitigation mechanisms
-
Budapest, Hungary
-
R. Hummen et al., "6LoWPAN fragmentation attacks and mitigation mechanisms," in Proc. ACM WiSec13, Budapest, Hungary, 2013, pp. 55-66
-
(2013)
Proc. ACM WiSec13
, pp. 55-66
-
-
Hummen, R.1
-
27
-
-
84908400493
-
-
IETF, draft-piro-6tisch-security-issues-02, Jun. Online]. Available:
-
G. Piro, G. Boggia, and L. A. Grieco, "Layer-2 security aspects for the IEEE 802.15.4e MAC," IETF, draft-piro-6tisch-security-issues-02, Jun. 2014 [Online]. Available: http://tools.ietf.org/html/draft-piro-6tischsecurity-issues-02
-
(2014)
Layer-2 Security Aspects for the IEEE 802.15.4e MAC
-
-
Piro, G.1
Boggia, G.2
Grieco, L.A.3
-
28
-
-
33746092156
-
IPv6 address autoconfiguration
-
Dec. Online]. Available:
-
S. Thomson and T. Narten, "IPv6 address autoconfiguration," IETF, RFC 2462, Dec. 1998 [Online]. Available: https://www.ietf.org/rfc/rfc2462.txt
-
(1998)
IETF, RFC
, vol.2462
-
-
Thomson, S.1
Narten, T.2
-
29
-
-
84908400492
-
-
Privacy Extensions for Stateless Address Autoconfiguration in IPv6 Jan
-
Privacy Extensions for Stateless Address Autoconfiguration in IPv6, RFC 3041, Jan. 2001
-
(2001)
RFC 3041
-
-
-
30
-
-
67049141598
-
IPv6 stateless address autoconfiguration
-
Sep. Online]. Available:
-
S. Thomson, T. Narten, and T. Jinmei, "IPv6 stateless address autoconfiguration," IETF, RFC 4862, Sep. 2007 [Online]. Available: http://tools. ietf.org/html/rfc4862
-
(2007)
IETF, RFC
, vol.4862
-
-
Thomson, S.1
Narten, T.2
Jinmei, T.3
-
31
-
-
79952910209
-
Privacy extensions for stateless address autoconfiguration in IPv6
-
Sep. Online]. Available:
-
T. Narten, R. Draves, and S. Krishnan, "Privacy extensions for stateless address autoconfiguration in IPv6," IETF, RFC 4941, Sep. 2007 [Online]. Available: https://www.ietf.org/rfc/rfc2462.txt
-
(2007)
IETF, RFC
, vol.4941
-
-
Narten, T.1
Draves, R.2
Krishnan, S.3
-
32
-
-
30744466949
-
Cryptographically generated addresses (CGA
-
Mar. Online]. Available:
-
T. Aura, "Cryptographically generated addresses (CGA)," IETF, RFC3972, Mar. 2005 [Online]. Available: http://www.ietf.org/rfc/ rfc3972.txt
-
(2005)
IETF, RFC3972
-
-
Aura, T.1
-
34
-
-
84874293263
-
A dtls based end-to-end security architecture for the internet of things with two-way authentication
-
T. Kothmayr, C. Schmitt, W. Hu, M. Brunig, and G. Carle, "A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication," in Proc. IEEE 37th Conf. Local Comput. Netw., 2012, pp. 956-963
-
(2012)
Proc. IEEE 37th Conf. Local Comput. Netw
, pp. 956-963
-
-
Kothmayr, T.1
Schmitt, C.2
Hu, W.3
Brunig, M.4
Carle, G.5
-
35
-
-
84908400491
-
-
Online]. Available:
-
M. Kovatsch. (2013). Copper (Cu) [Online]. Available: https://addons. mozilla.org/fr/firefox/addon/copper-270430/
-
(2013)
Copper (Cu
-
-
Kovatsch, M.1
|