-
1
-
-
33645091897
-
Sizzle: A standards-based end-To-end security architecture for the embedded internet
-
V. Gupta, M. Wurm, Y. Zhu, M. Millard, S. Fung, N. Gura, H. Eberle, and S. Chang Shantz, "Sizzle: A standards-based end-To-end security architecture for the embedded internet, " Pervasive and Mobile Computing, vol. 1, no. 4, pp. 425-445, 2005.
-
(2005)
Pervasive and Mobile Computing
, vol.1
, Issue.4
, pp. 425-445
-
-
Gupta, V.1
Wurm, M.2
Zhu, Y.3
Millard, M.4
Fung, S.5
Gura, N.6
Eberle, H.7
Chang Shantz, S.8
-
2
-
-
84883314073
-
Lithe: Lightweight secure CoAP for the internet of things
-
S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: Lightweight Secure CoAP for the Internet of Things, " Sensors Journal, IEEE, vol. 13, no. 10, pp. 3711-3720, 2013.
-
(2013)
Sensors Journal IEEE
, vol.13
, Issue.10
, pp. 3711-3720
-
-
Raza, S.1
Shafagh, H.2
Hewage, K.3
Hummen, R.4
Voigt, T.5
-
3
-
-
85013674001
-
Securing communication in 6LoWPAN with compressed IPsec
-
S. Raza, S. Duquennoy, T. Chung, T. Voigt, U. Roedig et al., "Securing communication in 6LoWPAN with compressed IPsec, " in DCOSS. IEEE, 2011, pp. 1-8.
-
(2011)
DCOSS IEEE
, pp. 1-8
-
-
Raza, S.1
Duquennoy, S.2
Chung, T.3
Voigt, T.4
Roedig, U.5
-
4
-
-
84864199559
-
6LoWPAN Compressed DTLS for CoAP distributed computing in sensor systems (DCOSS)
-
S. Raza, D. Trabalza, and T. Voigt, "6LoWPAN Compressed DTLS for CoAP, " in Distributed Computing in Sensor Systems (DCOSS), 2012 IEEE 8th International Conference on. IEEE, 2012, pp. 287-289.
-
(2012)
2012 IEEE 8th International Conference On. IEEE
, pp. 287-289
-
-
Raza, S.1
Trabalza, D.2
Voigt, T.3
-
5
-
-
84962792752
-
Constrained application protocol (CoAP) draft-ietf-core-coap-18
-
Z. Shelby, K. Hartke, and C. Bormann, "Constrained Application Protocol (CoAP) draft-ietf-core-coap-18, " IETF work in progress, 2013.
-
(2013)
IETF Work in Progress
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
-
7
-
-
76749083002
-
Networking named content
-
V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard, "Networking named content, " in Emerging networking experiments and technologies. ACM, 2009, pp. 1-12.
-
(2009)
Emerging Networking Experiments and Technologiest ACM
, pp. 1-12
-
-
Jacobson, V.1
Smetters, D.K.2
Thornton, J.D.3
Plass, M.F.4
Briggs, N.H.5
Braynard, R.L.6
-
8
-
-
36949039907
-
A data-oriented (and beyond) network architecture
-
ACM
-
T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, and I. Stoica, "A data-oriented (and beyond) network architecture, " in Computer Communication Review, vol. 37, no. 4. ACM, 2007, pp. 181-192.
-
(2007)
Computer Communication Review
, vol.37
, Issue.4
, pp. 181-192
-
-
Koponen, T.1
Chawla, M.2
Chun, B.-G.3
Ermolinskiy, A.4
Kim, K.H.5
Shenker, S.6
Stoica, I.7
-
11
-
-
84857206147
-
SenShare: Transforming sensor networks into multi-Application sensing infrastructures
-
Springer
-
I. Leontiadis, C. Efstratiou, C. Mascolo, and J. Crowcroft, "SenShare: transforming sensor networks into multi-Application sensing infrastructures, " in Wireless Sensor Networks. Springer, 2012, pp. 65-81.
-
(2012)
Wireless Sensor Networks
, pp. 65-81
-
-
Leontiadis, I.1
Efstratiou, C.2
Mascolo, C.3
Crowcroft, J.4
-
12
-
-
84908885230
-
Machine-To-Machine communications (M2M)
-
T. ETSI 102 691 V1. 1.1
-
T. ETSI, "102 691 V1. 1.1 Machine-To-Machine communications (M2M), " Smart Metering Use Cases, 2011.
-
(2011)
Smart Metering Use Cases
-
-
-
14
-
-
84883112893
-
Privacy preserving cloud data access with multi-Authorities
-
T. Jung, X.-Y. Li, and Z. Wan, "Privacy Preserving Cloud Data Access With Multi-Authorities, " in Infocom. IEEE, 2013.
-
(2013)
Infocom IEEE
-
-
Jung, T.1
Li, X.-Y.2
Wan, Z.3
-
15
-
-
84930759603
-
DTLS-based multicast security for low-power and lossy networks (LLNs) draft-keoh-dice-multicast-security-05
-
S. Keoh, S. Kumar, O. Garcia-Morchon, E. Dijk, and A. Rahman, "DTLS-based Multicast Security for Low-Power and Lossy Networks (LLNs) draft-keoh-dice-multicast-security-05, " IETF work in progress, 2014.
-
(2014)
IETF Work in Progress
-
-
Keoh, S.1
Kumar, S.2
Garcia-Morchon, O.3
Dijk, E.4
Rahman, A.5
-
16
-
-
84885311585
-
A novel batch-based group key management protocol applied to the internet of things
-
L. Veltri, S. Cirani, S. Busanelli, and G. Ferrari, "A Novel Batch-based Group Key Management Protocol Applied to the Internet of Things, " Ad Hoc Networks, vol. 11, pp. 2724-2737, 2013.
-
(2013)
Ad Hoc Networks
, vol.11
, pp. 2724-2737
-
-
Veltri, L.1
Cirani, S.2
Busanelli, S.3
Ferrari, G.4
-
17
-
-
84879548737
-
Towards viable certificate-based authentication for the internet of things
-
R. Hummen, J. H. Ziegeldorf, H. Shafagh, S. Raza, and K. Wehrle, "Towards Viable Certificate-based Authentication for the Internet of Things, " in Hot Topics on Wireless Network Security and Privacy. ACM, 2013, pp. 37-42.
-
(2013)
Hot Topics on Wireless Network Security and Privacy ACM
, pp. 37-42
-
-
Hummen, R.1
Ziegeldorf, J.H.2
Shafagh, H.3
Raza, S.4
Wehrle, K.5
-
18
-
-
84908892839
-
Practical issues with datagram transport layer security in constrained environments draft-hartke-dice-practical-issues-00
-
K. Hartke, "Practical Issues with Datagram Transport Layer Security in Constrained Environments draft-hartke-dice-practical-issues-00, " IETF work in progress, 2013.
-
(2013)
IETF Work in Progress
-
-
Hartke, K.1
-
19
-
-
84908885227
-
Energy cost of security in an energy-harvested
-
M. Vučinić, B. Tourancheau, F. Rousseau, A. Duda, L. Damon, and R. Guizzetti, "Energy Cost of Security in an Energy-Harvested IEEE 802.15.4 Wireless Sensor Network, " in MECO. IEEE, 2014.
-
(2014)
IEEE 802.15.4 Wireless Sensor Network MECO. IEEE
-
-
Vučinić, M.1
Tourancheau, B.2
Rousseau, F.3
Duda, A.4
Damon, L.5
Guizzetti, R.6
-
20
-
-
84908892838
-
Topology construction in RPL networks over beacon-enabled 802.15.4
-
M. Vučinić, G. Romaniello, L. Guelorget, B. Tourancheau, F. Rousseau, O. Alphand, A. Duda, and L. Damon, "Topology Construction in RPL Networks over Beacon-Enabled 802.15.4, " in ISCC. IEEE, 2014.
-
(2014)
ISCC IEEE
-
-
Vučinić, M.1
Romaniello, G.2
Guelorget, L.3
Tourancheau, B.4
Rousseau, F.5
Alphand, O.6
Duda, A.7
Damon, L.8
-
21
-
-
35348897342
-
MiniSec: A secure sensor network communication architecture
-
M. Luk, G. Mezzour, A. Perrig, and V. Gligor, "MiniSec: a secure sensor network communication architecture, " in IPSN. IEEE, 2007, p. 479.
-
(2007)
IPSN IEEE
, pp. 479
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
22
-
-
67650697114
-
Why is IPSec a viable option for wireless sensor networks
-
J. Granjal, R. Silva, E. Monteiro, J. Sa Silva, and F. Boavida, "Why is IPSec a viable option for wireless sensor networks, " in MASS. IEEE, 2008, pp. 802-807.
-
(2008)
MASS IEEE
, pp. 802-807
-
-
Granjal, J.1
Silva, R.2
Monteiro, E.3
Sa Silva, J.4
Boavida, F.5
-
23
-
-
67649560482
-
Integrating wireless sensor networks and the internet: A security analysis
-
R. Roman and J. Lopez, "Integrating wireless sensor networks and the internet: a security analysis, " Internet Research, vol. 19, no. 2, 2009.
-
(2009)
Internet Research
, vol.19
, Issue.2
-
-
Roman, R.1
Lopez, J.2
-
24
-
-
78751527354
-
A secure interconnection model for IPv6 enabled wireless sensor networks
-
J. Granjal, E. Monteiro, J. Silva et al., "A secure interconnection model for IPv6 enabled wireless sensor networks, " Wireless Days, 2010.
-
(2010)
Wireless Days
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.3
-
25
-
-
84867766892
-
Secure communication for the internet of things a comparison of link-layer security and ipsec for 6lowpan
-
S. Raza, S. Duquennoy, J. Höglund, U. Roedig, and T. Voigt, "Secure communication for the internet of things a comparison of link-layer security and ipsec for 6lowpan, " Security and Com. Networks, 2012.
-
(2012)
Security and Com. Networks
-
-
Raza, S.1
Duquennoy, S.2
Höglund, J.3
Roedig, U.4
Voigt, T.5
-
26
-
-
84875496381
-
On the effectiveness of end-To-end security for internet-integrated sensing applications
-
J. Granjal, E. Monteiro, and J. S. Silva, "On the Effectiveness of End-To-End Security for Internet-Integrated Sensing Applications, " in GreenCom. IEEE, 2012, pp. 87-93.
-
(2012)
GreenCom IEEE
, pp. 87-93
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.S.3
-
27
-
-
78650891113
-
SNAIL: An IP-based wireless sensor network approach to the internet of things
-
S. Hong, D. Kim, M. Ha, S. Bae, S. J. Park, W. Jung, and J.-E. Kim, "SNAIL: an IP-based wireless sensor network approach to the internet of things, " Wireless Comm. IEEE, vol. 17, no. 6, pp. 34-42, 2010.
-
(2010)
Wireless Comm IEEE
, vol.17
, Issue.6
, pp. 34-42
-
-
Hong, S.1
Kim, D.2
Ha, M.3
Bae, S.4
Park, S.J.5
Jung, W.6
Kim, J.-E.7
-
28
-
-
84883120784
-
Datagram transport layer security version 1.2
-
E. Rescorla and N. Modadugu, "Datagram Transport Layer Security Version 1.2, " IETF RFC 4944, 2012.
-
IETF RFC
, vol.4944
, pp. 2012
-
-
Rescorla, E.1
Modadugu, N.2
-
29
-
-
84867755083
-
End-To-End transport security in the ip-based internet of things
-
M. Brachmann, S. L. Keoh, O. Morchon, and S. Kumar, "End-To-End Transport Security in the IP-Based Internet of Things, " in ICCCN, 2012.
-
(2012)
ICCCN
-
-
Brachmann, M.1
Keoh, S.L.2
Morchon, O.3
Kumar, S.4
-
30
-
-
84874293263
-
A DTLS based end-To-end security architecture for the Internet of Things with two-way authentication
-
T. Kothmayr, C. Schmitt, W. Hu, M. Brunig, and G. Carle, "A DTLS based end-To-end security architecture for the Internet of Things with two-way authentication, " in LCN. IEEE, 2012, pp. 956-963.
-
(2012)
LCN IEEE
, pp. 956-963
-
-
Kothmayr, T.1
Schmitt, C.2
Hu, W.3
Brunig, M.4
Carle, G.5
-
31
-
-
84880413059
-
Enforcing security mechanisms in the ip-based internet of things: An algorithmic overview
-
S. Cirani, G. Ferrari, and L. Veltri, "Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview, " Algorithms, vol. 6, no. 2, pp. 197-226, 2013.
-
(2013)
Algorithms
, vol.6
, Issue.2
, pp. 197-226
-
-
Cirani, S.1
Ferrari, G.2
Veltri, L.3
-
32
-
-
84883665974
-
Authorization framework for the internet-of-Things
-
L. Seitz, G. Selander, and C. Gehrmann, "Authorization framework for the internet-of-Things, " in WoWMoM. IEEE, 2013, pp. 1-6.
-
(2013)
WoWMoM IEEE
, pp. 1-6
-
-
Seitz, L.1
Selander, G.2
Gehrmann, C.3
|