메뉴 건너뛰기




Volumn , Issue , 2014, Pages

OSCAR: Object security architecture for the Internet of Things

Author keywords

[No Author keywords available]

Indexed keywords

ENERGY CONSERVATION; INTERNET OF THINGS; LOW POWER ELECTRONICS;

EID: 84908888882     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WoWMoM.2014.6918975     Document Type: Conference Paper
Times cited : (38)

References (32)
  • 2
    • 84883314073 scopus 로고    scopus 로고
    • Lithe: Lightweight secure CoAP for the internet of things
    • S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: Lightweight Secure CoAP for the Internet of Things, " Sensors Journal, IEEE, vol. 13, no. 10, pp. 3711-3720, 2013.
    • (2013) Sensors Journal IEEE , vol.13 , Issue.10 , pp. 3711-3720
    • Raza, S.1    Shafagh, H.2    Hewage, K.3    Hummen, R.4    Voigt, T.5
  • 3
    • 85013674001 scopus 로고    scopus 로고
    • Securing communication in 6LoWPAN with compressed IPsec
    • S. Raza, S. Duquennoy, T. Chung, T. Voigt, U. Roedig et al., "Securing communication in 6LoWPAN with compressed IPsec, " in DCOSS. IEEE, 2011, pp. 1-8.
    • (2011) DCOSS IEEE , pp. 1-8
    • Raza, S.1    Duquennoy, S.2    Chung, T.3    Voigt, T.4    Roedig, U.5
  • 4
    • 84864199559 scopus 로고    scopus 로고
    • 6LoWPAN Compressed DTLS for CoAP distributed computing in sensor systems (DCOSS)
    • S. Raza, D. Trabalza, and T. Voigt, "6LoWPAN Compressed DTLS for CoAP, " in Distributed Computing in Sensor Systems (DCOSS), 2012 IEEE 8th International Conference on. IEEE, 2012, pp. 287-289.
    • (2012) 2012 IEEE 8th International Conference On. IEEE , pp. 287-289
    • Raza, S.1    Trabalza, D.2    Voigt, T.3
  • 5
    • 84962792752 scopus 로고    scopus 로고
    • Constrained application protocol (CoAP) draft-ietf-core-coap-18
    • Z. Shelby, K. Hartke, and C. Bormann, "Constrained Application Protocol (CoAP) draft-ietf-core-coap-18, " IETF work in progress, 2013.
    • (2013) IETF Work in Progress
    • Shelby, Z.1    Hartke, K.2    Bormann, C.3
  • 11
    • 84857206147 scopus 로고    scopus 로고
    • SenShare: Transforming sensor networks into multi-Application sensing infrastructures
    • Springer
    • I. Leontiadis, C. Efstratiou, C. Mascolo, and J. Crowcroft, "SenShare: transforming sensor networks into multi-Application sensing infrastructures, " in Wireless Sensor Networks. Springer, 2012, pp. 65-81.
    • (2012) Wireless Sensor Networks , pp. 65-81
    • Leontiadis, I.1    Efstratiou, C.2    Mascolo, C.3    Crowcroft, J.4
  • 12
    • 84908885230 scopus 로고    scopus 로고
    • Machine-To-Machine communications (M2M)
    • T. ETSI 102 691 V1. 1.1
    • T. ETSI, "102 691 V1. 1.1 Machine-To-Machine communications (M2M), " Smart Metering Use Cases, 2011.
    • (2011) Smart Metering Use Cases
  • 14
    • 84883112893 scopus 로고    scopus 로고
    • Privacy preserving cloud data access with multi-Authorities
    • T. Jung, X.-Y. Li, and Z. Wan, "Privacy Preserving Cloud Data Access With Multi-Authorities, " in Infocom. IEEE, 2013.
    • (2013) Infocom IEEE
    • Jung, T.1    Li, X.-Y.2    Wan, Z.3
  • 15
    • 84930759603 scopus 로고    scopus 로고
    • DTLS-based multicast security for low-power and lossy networks (LLNs) draft-keoh-dice-multicast-security-05
    • S. Keoh, S. Kumar, O. Garcia-Morchon, E. Dijk, and A. Rahman, "DTLS-based Multicast Security for Low-Power and Lossy Networks (LLNs) draft-keoh-dice-multicast-security-05, " IETF work in progress, 2014.
    • (2014) IETF Work in Progress
    • Keoh, S.1    Kumar, S.2    Garcia-Morchon, O.3    Dijk, E.4    Rahman, A.5
  • 16
    • 84885311585 scopus 로고    scopus 로고
    • A novel batch-based group key management protocol applied to the internet of things
    • L. Veltri, S. Cirani, S. Busanelli, and G. Ferrari, "A Novel Batch-based Group Key Management Protocol Applied to the Internet of Things, " Ad Hoc Networks, vol. 11, pp. 2724-2737, 2013.
    • (2013) Ad Hoc Networks , vol.11 , pp. 2724-2737
    • Veltri, L.1    Cirani, S.2    Busanelli, S.3    Ferrari, G.4
  • 18
    • 84908892839 scopus 로고    scopus 로고
    • Practical issues with datagram transport layer security in constrained environments draft-hartke-dice-practical-issues-00
    • K. Hartke, "Practical Issues with Datagram Transport Layer Security in Constrained Environments draft-hartke-dice-practical-issues-00, " IETF work in progress, 2013.
    • (2013) IETF Work in Progress
    • Hartke, K.1
  • 21
    • 35348897342 scopus 로고    scopus 로고
    • MiniSec: A secure sensor network communication architecture
    • M. Luk, G. Mezzour, A. Perrig, and V. Gligor, "MiniSec: a secure sensor network communication architecture, " in IPSN. IEEE, 2007, p. 479.
    • (2007) IPSN IEEE , pp. 479
    • Luk, M.1    Mezzour, G.2    Perrig, A.3    Gligor, V.4
  • 22
  • 23
    • 67649560482 scopus 로고    scopus 로고
    • Integrating wireless sensor networks and the internet: A security analysis
    • R. Roman and J. Lopez, "Integrating wireless sensor networks and the internet: a security analysis, " Internet Research, vol. 19, no. 2, 2009.
    • (2009) Internet Research , vol.19 , Issue.2
    • Roman, R.1    Lopez, J.2
  • 24
    • 78751527354 scopus 로고    scopus 로고
    • A secure interconnection model for IPv6 enabled wireless sensor networks
    • J. Granjal, E. Monteiro, J. Silva et al., "A secure interconnection model for IPv6 enabled wireless sensor networks, " Wireless Days, 2010.
    • (2010) Wireless Days
    • Granjal, J.1    Monteiro, E.2    Silva, J.3
  • 25
    • 84867766892 scopus 로고    scopus 로고
    • Secure communication for the internet of things a comparison of link-layer security and ipsec for 6lowpan
    • S. Raza, S. Duquennoy, J. Höglund, U. Roedig, and T. Voigt, "Secure communication for the internet of things a comparison of link-layer security and ipsec for 6lowpan, " Security and Com. Networks, 2012.
    • (2012) Security and Com. Networks
    • Raza, S.1    Duquennoy, S.2    Höglund, J.3    Roedig, U.4    Voigt, T.5
  • 26
    • 84875496381 scopus 로고    scopus 로고
    • On the effectiveness of end-To-end security for internet-integrated sensing applications
    • J. Granjal, E. Monteiro, and J. S. Silva, "On the Effectiveness of End-To-End Security for Internet-Integrated Sensing Applications, " in GreenCom. IEEE, 2012, pp. 87-93.
    • (2012) GreenCom IEEE , pp. 87-93
    • Granjal, J.1    Monteiro, E.2    Silva, J.S.3
  • 27
    • 78650891113 scopus 로고    scopus 로고
    • SNAIL: An IP-based wireless sensor network approach to the internet of things
    • S. Hong, D. Kim, M. Ha, S. Bae, S. J. Park, W. Jung, and J.-E. Kim, "SNAIL: an IP-based wireless sensor network approach to the internet of things, " Wireless Comm. IEEE, vol. 17, no. 6, pp. 34-42, 2010.
    • (2010) Wireless Comm IEEE , vol.17 , Issue.6 , pp. 34-42
    • Hong, S.1    Kim, D.2    Ha, M.3    Bae, S.4    Park, S.J.5    Jung, W.6    Kim, J.-E.7
  • 28
    • 84883120784 scopus 로고    scopus 로고
    • Datagram transport layer security version 1.2
    • E. Rescorla and N. Modadugu, "Datagram Transport Layer Security Version 1.2, " IETF RFC 4944, 2012.
    • IETF RFC , vol.4944 , pp. 2012
    • Rescorla, E.1    Modadugu, N.2
  • 29
    • 84867755083 scopus 로고    scopus 로고
    • End-To-End transport security in the ip-based internet of things
    • M. Brachmann, S. L. Keoh, O. Morchon, and S. Kumar, "End-To-End Transport Security in the IP-Based Internet of Things, " in ICCCN, 2012.
    • (2012) ICCCN
    • Brachmann, M.1    Keoh, S.L.2    Morchon, O.3    Kumar, S.4
  • 30
    • 84874293263 scopus 로고    scopus 로고
    • A DTLS based end-To-end security architecture for the Internet of Things with two-way authentication
    • T. Kothmayr, C. Schmitt, W. Hu, M. Brunig, and G. Carle, "A DTLS based end-To-end security architecture for the Internet of Things with two-way authentication, " in LCN. IEEE, 2012, pp. 956-963.
    • (2012) LCN IEEE , pp. 956-963
    • Kothmayr, T.1    Schmitt, C.2    Hu, W.3    Brunig, M.4    Carle, G.5
  • 31
    • 84880413059 scopus 로고    scopus 로고
    • Enforcing security mechanisms in the ip-based internet of things: An algorithmic overview
    • S. Cirani, G. Ferrari, and L. Veltri, "Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview, " Algorithms, vol. 6, no. 2, pp. 197-226, 2013.
    • (2013) Algorithms , vol.6 , Issue.2 , pp. 197-226
    • Cirani, S.1    Ferrari, G.2    Veltri, L.3
  • 32
    • 84883665974 scopus 로고    scopus 로고
    • Authorization framework for the internet-of-Things
    • L. Seitz, G. Selander, and C. Gehrmann, "Authorization framework for the internet-of-Things, " in WoWMoM. IEEE, 2013, pp. 1-6.
    • (2013) WoWMoM IEEE , pp. 1-6
    • Seitz, L.1    Selander, G.2    Gehrmann, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.