-
1
-
-
77956877124
-
The internet of things: A survey
-
L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey, " Computer networks, vol. 54, no. 15, pp. 2787-2805, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
2
-
-
84876943063
-
Internet of things (iot): A vision, architectural elements, and future directions
-
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of things (iot): A vision, architectural elements, and future directions, " Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
5
-
-
20544456753
-
Contiki - A lightweight and flexible operating system for tiny networked sensors
-
IEEE
-
A. Dunkels, B. Gronvall, and T. Voigt, "Contiki- A lightweight and flexible operating system for tiny networked sensors, " in Local Computer Networks, 2004. 29th Annual IEEE International Conference on, pp. 455-462, IEEE, 2004.
-
(2004)
Local Computer Networks, 2004. 29th Annual IEEE International Conference on
, pp. 455-462
-
-
Dunkels, A.1
Gronvall, B.2
Voigt, T.3
-
6
-
-
84881466192
-
Case study of a black hole attack on 6lowpan-rpl
-
K. Chugh, A. Lasebae, and J. Loo, "Case study of a black hole attack on 6lowpan-rpl, " in SECURWARE 2012, The Sixth International Conference on Emerging Security Information, Systems and Technologies, pp. 157-162, 2012.
-
(2012)
SECURWARE 2012, the Sixth International Conference on Emerging Security Information, Systems and Technologies
, pp. 157-162
-
-
Chugh, K.1
Lasebae, A.2
Loo, J.3
-
7
-
-
84895207016
-
Tinyos: An operating system for sensor networks
-
Springer
-
P. Levis, S. Madden, J. Polastre, R. Szewczyk, K. Whitehouse, A. Woo, D. Gay, J. Hill, M. Welsh, E. Brewer, et al., "Tinyos: An operating system for sensor networks, " in Ambient intelligence, pp. 115-148, Springer, 2005.
-
(2005)
Ambient Intelligence
, pp. 115-148
-
-
Levis, P.1
Madden, S.2
Polastre, J.3
Szewczyk, R.4
Whitehouse, K.5
Woo, A.6
Gay, D.7
Hill, J.8
Welsh, M.9
Brewer, E.10
-
8
-
-
84921521711
-
-
E. Baccelli, O. Hahm, M. Wählisch, M. Gunes, T. Schmidt, et al., "Riot: One os to rule them all in the iot, " 2012.
-
(2012)
Riot: One Os to Rule Them All in the Iot
-
-
Baccelli, E.1
Hahm, O.2
Wählisch, M.3
Gunes, M.4
Schmidt, T.5
-
13
-
-
84901244508
-
Constrained application protocol (coap), draft-ietf-core-coap-13
-
Z. Shelby, K. Hartke, C. Bormann, and B. Frank, "Constrained application protocol (coap), draft-ietf-core-coap-13, " Orlando: The Internet Engineering Task Force-IETF, Dec, 2012.
-
(2012)
Orlando: The Internet Engineering Task Force-IETF, Dec
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
Frank, B.4
-
14
-
-
35048818581
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
Springer
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing elliptic curve cryptography and rsa on 8-bit cpus, " in Cryptographic Hardware and Embedded Systems-CHES 2004, pp. 119-132, Springer, 2004.
-
(2004)
Cryptographic Hardware and Embedded Systems-CHES
, vol.2004
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
16
-
-
72949104155
-
A survey on jamming attacks and countermeasures in wsns
-
IEEE
-
A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou, "A survey on jamming attacks and countermeasures in wsns, " Communications Surveys & Tutorials, IEEE, vol. 11, no. 4, pp. 42-56, 2009.
-
(2009)
Communications Surveys & Tutorials
, vol.11
, Issue.4
, pp. 42-56
-
-
Mpitziopoulos, A.1
Gavalas, D.2
Konstantopoulos, C.3
Pantziou, G.4
-
17
-
-
0034445661
-
System architecture directions for networked sensors
-
ACM
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, "System architecture directions for networked sensors, " in ACM SIGOPS operating systems review, vol. 34, pp. 93-104, ACM, 2000.
-
(2000)
ACM SIGOPS Operating Systems Review
, vol.34
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
20
-
-
80055040638
-
Killerbee-practical zigbee exploitation framework
-
J. Wright, "Killerbee-practical zigbee exploitation framework, " in Toorcon11, 2009.
-
(2009)
Toorcon11
-
-
Wright, J.1
-
21
-
-
84881005272
-
Gts attack: An ieee 802.15. 4 mac layer attack in wireless sensor networks
-
R. Sokullu, I. Korkmaz, and O. Dagdeviren, "Gts attack: An ieee 802.15. 4 mac layer attack in wireless sensor networks, " International Journal On Advances in Internet Technology, vol. 2, no. 1, pp. 104-114, 2009.
-
(2009)
International Journal on Advances in Internet Technology
, vol.2
, Issue.1
, pp. 104-114
-
-
Sokullu, R.1
Korkmaz, I.2
Dagdeviren, O.3
-
22
-
-
33845762444
-
Detecting ieee 802.11 mac layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
-
S. Radosavac, A. A. Cárdenas, J. S. Baras, and G. V. Moustakides, "Detecting ieee 802.11 mac layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers, " Journal of Computer Security, vol. 15, no. 1, pp. 103-128, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 103-128
-
-
Radosavac, S.1
Cárdenas, A.A.2
Baras, J.S.3
Moustakides, G.V.4
-
23
-
-
33751531045
-
Security services and enhancements in the ieee 802.15. 4 wireless sensor networks
-
Y. Xiao, S. Sethi, H.-H. Chen, and B. Sun, "Security services and enhancements in the ieee 802.15. 4 wireless sensor networks, " in Global Telecommunications Conference, 2005. GLOBECOM'05. IEEE, 2005.
-
(2005)
Global Telecommunications Conference, 2005. GLOBECOM'05. IEEE
-
-
Xiao, Y.1
Sethi, S.2
Chen, H.-H.3
Sun, B.4
-
24
-
-
84865658341
-
6lowpan: A study on qos security threats and countermeasures using intrusion detection system approach
-
A. Le, J. Loo, A. Lasebae, M. Aiash, and Y. Luo, "6lowpan: a study on qos security threats and countermeasures using intrusion detection system approach, " International Journal of Communication Systems, vol. 25, no. 9, pp. 1189-1212, 2012.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.9
, pp. 1189-1212
-
-
Le, A.1
Loo, J.2
Lasebae, A.3
Aiash, M.4
Luo, Y.5
-
25
-
-
70449633122
-
Security analysis survey and framework design for ip connected lowpans
-
R. Riaz, K.-H. Kim, and H. Ahmed, "Security analysis survey and framework design for ip connected lowpans, " in Autonomous Decentralized Systems, 2009. ISADS '09. International Symposium on, March 2009.
-
(2009)
Autonomous Decentralized Systems, 2009. ISADS '09. International Symposium on March
-
-
Riaz, R.1
Kim, K.-H.2
Ahmed, H.3
-
26
-
-
84884229742
-
Routing attacks and counter-measures in the rpl-based internet of things
-
L. Wallgren, S. Raza, and T. Voigt, "Routing attacks and counter-measures in the rpl-based internet of things, " International Journal of Distributed Sensor Networks, vol. 2013, 2013.
-
(2013)
International Journal of Distributed Sensor Networks
, vol.2013
-
-
Wallgren, L.1
Raza, S.2
Voigt, T.3
-
27
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures, " Ad hoc networks, vol. 1, no. 2, pp. 293-315, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
29
-
-
0036793924
-
Denial of service in sensor networks
-
A. Wood and J. A. Stankovic, "Denial of service in sensor networks, " Computer, vol. 35, no. 10, pp. 54-62, 2002.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.A.2
-
30
-
-
84921479575
-
-
"Xmpploit." http://tanguy.ortolo.eu/blog/article69/xmpploit-explained.
-
Xmpploit
-
-
|