-
5
-
-
84916924803
-
-
[Online]. Available: accessed Oct. 15
-
IPSO Alliance. [Online]. Available: Http://www.ipso-alliance.org/, accessed Oct. 15, 2014.
-
(2014)
-
-
-
7
-
-
78650911380
-
-
Internet Engineering Task Force, Jun. [Online]. Available:
-
Z. Shelby, K. Hartke, and C. Bormann, The Constrained Application Protocol (CoAP), RFC 7252, Internet Engineering Task Force, Jun. 2014. [Online]. Available: Http://www.ietf.org/rfc/rfc7252.txt
-
(2014)
The Constrained Application Protocol (CoAP), RFC 7252
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
-
8
-
-
84916924802
-
-
[Online]. Available:
-
Worldsensing, Barcelona, Spain. [Online]. Available: Http://wwww.worldsensing.com/
-
-
-
-
9
-
-
84880413059
-
Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview
-
[Online]. Available:
-
S. Cirani, G. Ferrari, and L. Veltri, "Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview," Algorithms, vol. 6, no. 2, pp. 197-226, 2013. [Online]. Available: Http://www.mdpi.com/1999-4893/6/2/197
-
(2013)
Algorithms
, vol.6
, Issue.2
, pp. 197-226
-
-
Cirani, S.1
Ferrari, G.2
Veltri, L.3
-
10
-
-
84876156481
-
Cyberentity security in the internet of things
-
Apr.
-
H. Ning, H. Liu, and L. T. Yang, "Cyberentity security in the internet of things," Computer, vol. 46, no. 4, pp. 46-53, Apr. 2013.
-
(2013)
Computer
, vol.46
, Issue.4
, pp. 46-53
-
-
Ning, H.1
Liu, H.2
Yang, L.T.3
-
11
-
-
84883421524
-
A lightweight multicast authentication mechanism for small scale IoT applications
-
Oct.
-
X. Yao, X. Han, X. Du, and X. Zhou, "A lightweight multicast authentication mechanism for small scale IoT applications," IEEE Sensors J., vol. 13, no. 10, pp. 3693-3701, Oct. 2013.
-
(2013)
IEEE Sensors J.
, vol.13
, Issue.10
, pp. 3693-3701
-
-
Yao, X.1
Han, X.2
Du, X.3
Zhou, X.4
-
12
-
-
84906756164
-
CPAL: A conditional privacy-preserving authentication with access linkability for roaming service
-
Feb.
-
C. Lai, H. Li, X. Liang, R. Lu, K. Zhang, and X. Shen, "CPAL: A conditional privacy-preserving authentication with access linkability for roaming service," IEEE Internet Things J., vol. 1, no. 1, pp. 46-57, Feb. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.1
, pp. 46-57
-
-
Lai, C.1
Li, H.2
Liang, X.3
Lu, R.4
Zhang, K.5
Shen, X.6
-
13
-
-
84883394343
-
Practical secure communication for integrating wireless sensor networks into the internet of things
-
Oct.
-
F. Li and P. Xiong, "Practical secure communication for integrating wireless sensor networks into the internet of things," IEEE Sensors J., vol. 13, no. 10, pp. 3677-3684, Oct. 2013.
-
(2013)
IEEE Sensors J.
, vol.13
, Issue.10
, pp. 3677-3684
-
-
Li, F.1
Xiong, P.2
-
14
-
-
84916892077
-
-
May Online] Available:
-
D. Forsberg, Y. Ohba, B. Patil, H. Tschofenig, and A. Yegin, Protocol for Carrying Authentication for Network Access (PANA), RFC 5191, Internet Engineering Task Force, May 2008. [Online]. Available: Http://www.ietf.org/rfc/rfc5191.txt
-
(2008)
Protocol for Carrying Authentication for Network Access (PANA) RFC 5191 Internet Engineering Task Force
-
-
Forsberg, D.1
Ohba, Y.2
Patil, B.3
Tschofenig, H.4
Yegin, A.5
-
15
-
-
13244299564
-
-
Internet Engineering Task Force, Jun. [Online]. Available:
-
B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz, Extensible Authentication Protocol (EAP), RFC 3748, Internet Engineering Task Force, Jun. 2004. [Online]. Available: Http://www.ietf.org/rfc/rfc3748.txt
-
(2004)
Extensible Authentication Protocol (EAP), RFC 3748
-
-
Aboba, B.1
Blunk, L.2
Vollbrecht, J.3
Carlson, J.4
Levkowetz, H.5
-
16
-
-
84899017569
-
An open source implementation of the protocol for carrying authentication for network access: OpenPANA
-
Mar.
-
P. Moreno-Sanchez, R. Marin-Lopez, and F. Vidal-Meca, "An open source implementation of the protocol for carrying authentication for network access: OpenPANA," IEEE Netw., vol. 28, no. 2, pp. 49-55, Mar. 2014.
-
(2014)
IEEE Netw.
, vol.28
, Issue.2
, pp. 49-55
-
-
Moreno-Sanchez, P.1
Marin-Lopez, R.2
Vidal-Meca, F.3
-
17
-
-
0003969635
-
Department of Defense Trusted Computer System Evaluation Criteria
-
Dec. [Online]. Available:
-
United States Department of Defense, "Department of Defense Trusted Computer System Evaluation Criteria," U.S. Dept. Defense, Tech. Rep. DoD 5200.28-STD, Dec. 1985. [Online]. Available: Http://csrc.nist.gov/publications/history/dod85.pdf
-
(1985)
U.S. Dept. Defense, Tech. Rep. DoD 5200.28-STD
-
-
-
18
-
-
0002357382
-
Role-based access controls
-
Baltimore, MD, USA Oct.
-
D. Ferraiolo and R. Kuhn, "Role-based access controls," in Proc. 15th NIST-NCSC Nat. Comput. Security Conf., Baltimore, MD, USA, Oct. 1992, pp. 554-563.
-
(1992)
Proc. 15th NIST-NCSC Nat. Comput. Security Conf.
, pp. 554-563
-
-
Ferraiolo, D.1
Kuhn, R.2
-
19
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Aug. [Online]. Available:
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, "Proposed NIST standard for role-based access control," ACM Trans. Inf. Syst. Secur., vol. 4, no. 3, pp. 224-274, Aug. 2001. [Online]. Available: Http://doi.acm.org/10.1145/501978.501980
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
20
-
-
0030086382
-
Rolebased access control models
-
Feb.
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Rolebased access control models," IEEE Comput., vol. 29, no. 2, pp. 38-47, Feb. 1996.
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
21
-
-
33749080076
-
Attributed based access control (ABAC) for web services
-
Jul.
-
E. Yuan and J. Tong, "Attributed based access control (ABAC) for web services," in Proc. IEEE Int. Conf. Web Services (ICWS), vol. 856, Jul. 2005, p. 2.
-
(2005)
Proc. IEEE Int. Conf. Web Services (ICWS)
, vol.856
, pp. 2
-
-
Yuan, E.1
Tong, J.2
-
22
-
-
79951852472
-
Dauth: Fine-grained authorization delegation for distributed web application consumers
-
Jul.
-
J. Schiffman, X. Zhang, and S. Gibbs, "DAuth: Fine-grained authorization delegation for distributed web application consumers," in Proc. IEEE Int. Symp. Policies Distrib. Syst. Netw. (POLICY), Jul. 2010, pp. 95-102.
-
(2010)
Proc. IEEE Int. Symp. Policies Distrib. Syst. Netw. (POLICY)
, pp. 95-102
-
-
Schiffman, J.1
Zhang, X.2
Gibbs, S.3
-
23
-
-
77954942442
-
Modular context-aware access control for medical sensor networks
-
New York, NY, USA [Online]. Available:
-
O. Garcia-Morchon and K. Wehrle, "Modular context-aware access control for medical sensor networks," in Proc. 15th ACM Symp. Access Control Models Technol. (SACMAT), New York, NY, USA, 2010, pp. 129-138. [Online]. Available: Http://doi.acm.org/10.1145/1809842. 1809864
-
(2010)
Proc. 15th ACM Symp. Access Control Models Technol. (SACMAT)
, pp. 129-138
-
-
Garcia-Morchon, O.1
Wehrle, K.2
-
24
-
-
84920139330
-
Delegated CoAP authentication and authorization framework (DCAF)
-
Jul. [Online]. Available:
-
S. Gerdes, O. Bergmann, and C. Bormann, "Delegated CoAP authentication and authorization framework (DCAF)," IETF Internet Draft, Tech. Rep. draft-gerdes-ace-dcaf-authorize-00, Jul. 2014. [Online]. Available: Http://tools.ietf.org/html/draft-gerdes-ace-dcaf-authorize-00
-
(2014)
IETF Internet Draft, Tech. Rep. Draft-gerdes-ace-dcaf-authorize-00
-
-
Gerdes, S.1
Bergmann, O.2
Bormann, C.3
-
25
-
-
84916924800
-
-
Dec. [Online]. Available:
-
OpenID authentication 2.0-Final," OpenID Foundation, Tech. Rep., Dec. 2007. [Online]. Available: Http://openid.net/specs/openidauthentication-2-0.html
-
(2007)
OpenID Foundation, Tech. Rep.
-
-
-
28
-
-
70449496394
-
-
[Online]. Available: accessed Oct. 15
-
The Contiki Operating System. [Online]. Available: Http://www.contikios. org, accessed Oct. 15, 2014.
-
(2014)
The Contiki Operating System
-
-
-
29
-
-
80052447165
-
Securing communication in 6LoWPAN with compressed IPsec
-
Barcelona, Spain, Jun.
-
S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt, and U. Roedig, "Securing communication in 6LoWPAN with compressed IPsec," in Proc. Int. Conf. Distrib. Comput. Sensor Syst. (DCOSS), Barcelona, Spain, Jun. 2011, pp. 1-8.
-
(2011)
Proc. Int. Conf. Distrib. Comput. Sensor Syst. (DCOSS)
, pp. 1-8
-
-
Raza, S.1
Duquennoy, S.2
Chung, T.3
Yazar, D.4
Voigt, T.5
Roedig, U.6
-
30
-
-
84864199559
-
6LoWPAN compressed DTLS for CoAP
-
Hangzhou, China, May
-
S. Raza, D. Trabalza, and T. Voigt, "6LoWPAN compressed DTLS for CoAP," in Proc. 8th IEEE Int. Conf. Distrib. Comput. Sensor Syst. (DCOSS), Hangzhou, China, May 2012, pp. 287-289.
-
(2012)
Proc. 8th IEEE Int. Conf. Distrib. Comput. Sensor Syst. (DCOSS)
, pp. 287-289
-
-
Raza, S.1
Trabalza, D.2
Voigt, T.3
-
31
-
-
83355164042
-
A low-power CoAP for Contiki
-
Valencia, Spain, Oct.
-
M. Kovatsch, S. Duquennoy, and A. Dunkels, "A low-power CoAP for Contiki," in Proc. Workshop Internet Things Technol. Architect. (IoTech), Valencia, Spain, Oct. 2011, pp. 855-860.
-
(2011)
Proc. Workshop Internet Things Technol. Architect. (IoTech)
, pp. 855-860
-
-
Kovatsch, M.1
Duquennoy, S.2
Dunkels, A.3
-
33
-
-
81155141912
-
The keccak sha-3 submission
-
National Institute of Standards and Technology (NIST) [Online]. Available:
-
G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, "The Keccak SHA-3 submission," in Submission to NIST (Round 3). National Institute of Standards and Technology (NIST), 2011. [Online]. Available: Http://keccak.noekeon.org/Keccak-submission-3.pdf
-
(2011)
Submission to NIST (Round 3)
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
34
-
-
83355168853
-
Powertrace: Networklevel power profiling for low-power wireless networks
-
Kista, Sweden, Tech. Rep. T2011:05 Mar. [Online]. Available:
-
A. Dunkels, J. Eriksson, N. Finne, and N. Tsiftes, "Powertrace: Networklevel power profiling for low-power wireless networks," Swedish Institute. Comput. Sci., Kista, Sweden, Tech. Rep. T2011:05, Mar. 2011. [Online]. Available: Http://soda.swedish-ict.se/4112/1/T2011-05.pdf
-
(2011)
Swedish Institute. Comput. Sci.
-
-
Dunkels, A.1
Eriksson, J.2
Finne, N.3
Tsiftes, N.4
-
35
-
-
84863713348
-
Security considerations in the IP-based internet of things
-
Mar. [Online]. Available:
-
O. Garcia-Morchon, S. Keoh, S. Kumar, R. Hummen, and R. Struik, "Security considerations in the IP-based internet of things," IETF Internet Draft, Tech. Rep., Mar. 2012. [Online]. Available: Http://tools.ietf.org/id/draft-garcia-core-security-04
-
(2012)
IETF Internet Draft Tech. Rep.
-
-
Garcia-Morchon, O.1
Keoh, S.2
Kumar, S.3
Hummen, R.4
Struik, R.5
-
36
-
-
84869815133
-
TEA, a tiny encryption algorithm
-
B. Preneel, Ed. Berlin, Germany: Springer- Verlag [Online]. Available:
-
D. Wheeler and R. Needham, "TEA, a tiny encryption algorithm," in Fast Software Encryption (Lecture Notes in Computer Science), vol. 1008, B. Preneel, Ed. Berlin, Germany: Springer-Verlag, 1995, pp. 363-366. [Online]. Available: Http://dx.doi.org/10.1007/3-540-60590-8-29
-
(1995)
Fast Software Encryption (Lecture Notes in Computer Science)
, vol.1008
, pp. 363-366
-
-
Wheeler, D.1
Needham, R.2
-
37
-
-
33745777809
-
SEA: A scalable encryption algorithm for small embedded applications
-
J. Domingo-Ferrer, J. Posegga, and D. Schreckling, Eds. Berlin, Germany: Springer- Verlag [Online]. Available:
-
F.-X. Standaert, G. Piret, N. Gershenfeld, and J.-J. Quisquater, "SEA: A scalable encryption algorithm for small embedded applications," in Smart Card Research and Advanced Applications (Lecture Notes in Computer Science), vol. 3928, J. Domingo-Ferrer, J. Posegga, and D. Schreckling, Eds. Berlin, Germany: Springer-Verlag, 2006, pp. 222-236. [Online]. Available: Http://dx.doi.org/10.1007/11733447-16
-
(2006)
Smart Card Research and Advanced Applications (Lecture Notes in Computer Science)
, vol.3928
, pp. 222-236
-
-
Standaert, F.-X.1
Piret, G.2
Gershenfeld, N.3
Quisquater, J.-J.4
-
38
-
-
37149045263
-
Present: An ultra-lightweight block cipher
-
P. Paillier and I. Verbauwhede, Eds. Berlin, Germany: Springer- Verlag [Online]. Available:
-
A. Bogdanov et al., "PRESENT: An ultra-lightweight block cipher," in Cryptographic Hardware and Embedded Systems-CHES (Lecture Notes in Computer Science), vol. 4727, P. Paillier and I. Verbauwhede, Eds. Berlin, Germany: Springer-Verlag, 2007, pp. 450-466. [Online]. Available: Http://dx.doi.org/10.1007/978-3-540-74735-2-31
-
(2007)
Cryptographic Hardware and Embedded Systems-CHES (Lecture Notes in Computer Science)
, vol.4727
, pp. 450-466
-
-
Bogdanov, A.1
-
39
-
-
51049092732
-
Hash functions and RFID tags: Mind the gap
-
[Online]. Available:
-
A. Bogdanov, G. Leander, C. Paar, A. Poschmann, M. J. Robshaw, and Y. Seurin, "Hash functions and RFID tags: Mind the gap," in Proc. 10th Int. Workshop Cryptograph. Hardw. Embedded Syst. (CHES), 2008, pp. 283-299. [Online]. Available: Http://dx.doi.org/10.1007/978-3-540-85053-3-18
-
(2008)
Proc. 10th Int. Workshop Cryptograph. Hardw. Embedded Syst. (CHES)
, pp. 283-299
-
-
Bogdanov, A.1
Leander, G.2
Paar, C.3
Poschmann, A.4
Robshaw, M.J.5
Seurin, Y.6
|