메뉴 건너뛰기




Volumn , Issue , 2015, Pages 205-211

A robust authentication scheme for observing resources in the internet of things environment

Author keywords

Authentication; CoAP; Conditional option; Internet of things (IoT); Resource observation

Indexed keywords

AUTHENTICATION;

EID: 84923037755     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2014.31     Document Type: Conference Paper
Times cited : (68)

References (16)
  • 1
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Computer networks, vol. 54, no. 15, pp. 2787-2805, 2010.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 3
    • 38349154579 scopus 로고    scopus 로고
    • Denial-of-service in wireless sensor networks: Attacks and defenses
    • D. R. Raymond and S. F. Midkiff, "Denial-of-service in wireless sensor networks: Attacks and defenses," Pervasive Computing, IEEE, vol. 7, no. 1, pp. 74-81, 2008.
    • (2008) Pervasive Computing, IEEE , vol.7 , Issue.1 , pp. 74-81
    • Raymond, D.R.1    Midkiff, S.F.2
  • 4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.