-
1
-
-
85037175440
-
Wireless sensor network security: A survey
-
X. Yang, Ed., CRC Press
-
J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless sensor network security: a survey", in Distributed, Grid, and Pervasive Computing, X. Yang, Ed., p. 849, CRC Press, 2007.
-
(2007)
Distributed, Grid, and Pervasive Computing
, pp. 849
-
-
Walters, J.P.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
-
3
-
-
85045834571
-
Zig bee specification version 1.0
-
"Zig Bee Specification Version 1.0", Zig Bee Alliance, 2008, http://www.zigbee.org/home.aspx.
-
(2008)
Zig Bee Alliance
-
-
-
4
-
-
74949143896
-
Internet of things-new security and privacy challenges
-
R. H. Weber, "Internet of things-new security and privacy challenges", Computer Law and Security Review, vol. 26, no. 1, pp. 23-30, 2010.
-
(2010)
Computer Law and Security Review
, vol.26
, Issue.1
, pp. 23-30
-
-
Weber, R.H.1
-
5
-
-
84876943063
-
Internet of Things (IoT): A vision, architectural elements, and future directions
-
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): a vision, architectural elements, and future directions", Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
6
-
-
84867755083
-
End-to-end transport security in the IP-based internet of things
-
IEEE, Munich, Germany, August
-
M. Brachmann, S. L. Keoh, O. G. Morchon, and S. S. Kumar, "End-to-end transport security in the IP-based internet of things", in Proceedings of the 21st International Conference on Computer Communications and Networks (ICCCN'12), pp. 1-5, IEEE, Munich, Germany, August 2012.
-
(2012)
Proceedings of the 21st International Conference on Computer Communications and Networks (ICCCN'12)
, pp. 1-5
-
-
Brachmann, M.1
Keoh, S.L.2
Morchon, O.G.3
Kumar, S.S.4
-
7
-
-
84879225866
-
Onthe features andchallenges of security and privacy in distributed internet of things
-
R. Roman, J. Zhou, and J. Lopez, "Onthe features andchallenges of security and privacy in distributed internet of things", Computer Networks, vol. 57, no. 10, pp. 2266-2279, 2013.
-
(2013)
Computer Networks
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
8
-
-
70449596680
-
IPv6 over low-power wireless personal area networks (6Lo WPANs): Overview, assumptions, problem statement, and goals
-
N. Kushalnagar, G. Montenegro, and C. Schumacher", IPv6 over Low-Power Wireless Personal Area Networks (6Lo WPANs): overview, Assumptions, Problem Statement, and Goals", IETF RFC 4919, 2007, http://tools.ietf.org/html/rfc4919.
-
(2007)
IETF RFC 4919
-
-
Kushalnagar, N.1
Montenegro, G.2
Schumacher, C.3
-
9
-
-
46449128945
-
Transmission of IPv6 packets over IEEE 802.15.4 networks
-
September
-
G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, "Transmission of IPv6 packets over IEEE 802.15.4 networks", IETF R FC 4944, September 2007, http://tools.ietf.org/html/rfc4944.
-
(2007)
IETF R FC 4944
-
-
Montenegro, G.1
Kushalnagar, N.2
Hui, J.3
Culler, D.4
-
10
-
-
78650911380
-
Constrained application protocol (CoAP)
-
R FC editor
-
Z. Shelby, K. Hartke, and C. Bormann, "Constrained Application Protocol (CoAP)", IETF draft, R FC editor, 2013, http://tools.ietf.org/pdf/draft-ietf-core-coap-18.pdf.
-
(2013)
IETF Draft
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
-
11
-
-
84871266331
-
RPL: IPv6 routing protocol for low-power and lossy networks
-
T. Winter, P. Thubert, A. Brandt et al., "RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks", IETF RFC 6550, 2012, http://tools.ietf.org/html/rfc6550.
-
(2012)
IETF RFC 6550
-
-
Winter, T.1
Thubert, P.2
Brandt, A.3
-
12
-
-
84871797415
-
Wireless sensor network reliability and security in factory automation: A survey
-
K. Islam, W. Shen, and X. Wang, "Wireless sensor network reliability and security in factory automation: a survey", IEEE Transactions on Systems, Man and Cybernetics C: Applications and Reviews, vol. 42, no. 6, pp. 1243-1256, 2012.
-
(2012)
IEEE Transactions on Systems, Man and Cybernetics C: Applications and Reviews
, vol.42
, Issue.6
, pp. 1243-1256
-
-
Islam, K.1
Shen, W.2
Wang, X.3
-
13
-
-
84858220235
-
Private entity authentication for pervasive computing environments
-
F. Zhu, M. W. Mutka, and L. M. Ni, "Private entity authentication for pervasive computing environments", International Journal of Network Security, vol. 14, no. 2, pp. 86-100, 2012.
-
(2012)
International Journal of Network Security
, vol.14
, Issue.2
, pp. 86-100
-
-
Zhu, F.1
Mutka, M.W.2
Ni, L.M.3
-
14
-
-
84934949842
-
An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment
-
S. Shin, T. Shon, H. Yeh, and K. Kim, "An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment", Peer-to-Peer Networking and Applications, 2013.
-
(2013)
Peer-to-peer Networking and Applications
-
-
Shin, S.1
Shon, T.2
Yeh, H.3
Kim, K.4
-
15
-
-
84862848192
-
PKC based broadcast authentication using signature amortization for WSNs
-
Y. Liu, J. Li, and M. Guizani, "PKC based broadcast authentication using signature amortization for WSNs", IEEE Transactions on Wireless Communications, vol. 11, no. 6, pp. 2106-2115, 2012.
-
(2012)
IEEE Transactions on Wireless Communications
, vol.11
, Issue.6
, pp. 2106-2115
-
-
Liu, Y.1
Li, J.2
Guizani, M.3
-
16
-
-
77954163084
-
Secure and efficient broadcast authentication in wireless sensor networks
-
T. Kwon and J. Hong, "Secure and efficient broadcast authentication in wireless sensor networks", IEEE Transactions on Computers, vol. 59, no. 8, pp. 1120-1133, 2010.
-
(2010)
IEEE Transactions on Computers
, vol.59
, Issue.8
, pp. 1120-1133
-
-
Kwon, T.1
Hong, J.2
-
17
-
-
35248893214
-
Datagram transport layer security
-
April, http://tools.ietf.org/html/rfc4347
-
E. Rescorla and N. Modadugu, "Datagram Transport Layer Security", IETF RFC 4347, April 2006, http://tools.ietf.org/html/http://tools.ietf.org/html/rfc4347.
-
(2006)
IETF RFC 4347
-
-
Rescorla, E.1
Modadugu, N.2
-
18
-
-
84885304488
-
DTLS based security and two-way authentication for the Internet of Things
-
T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, and G. Carle, "DTLS based security and two-way authentication for the Internet of Things", Ad Hoc Networks, vol. 11, no. 8, pp. 2710-2723, 2013.
-
(2013)
Ad Hoc Networks
, vol.11
, Issue.8
, pp. 2710-2723
-
-
Kothmayr, T.1
Schmitt, C.2
Hu, W.3
Brünig, M.4
Carle, G.5
-
19
-
-
70349646298
-
Design and implementation of a secure wireless mote-based medical sensor network
-
K. Malasri and L. Wang, "Design and implementation of a secure wireless mote-based medical sensor network", Sensors, vol. 9, no. 8, pp. 6273-6297, 2009.
-
(2009)
Sensors
, vol.9
, Issue.8
, pp. 6273-6297
-
-
Malasri, K.1
Wang, L.2
-
20
-
-
79953785474
-
GRS: The green, reliability, and security of emerging machine to machine communications
-
R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, "GRS: the green, reliability, and security of emerging machine to machine communications", IEEE Communications Magazine, vol. 49, no. 4, pp. 28-35, 2011.
-
(2011)
IEEE Communications Magazine
, vol.49
, Issue.4
, pp. 28-35
-
-
Lu, R.1
Li, X.2
Liang, X.3
Shen, X.4
Lin, X.5
-
22
-
-
33645091897
-
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
-
V. Gupta, M. Wurm, Y. Zhu et al., "Sizzle: a standards-based end-to-end security architecture for the embedded Internet", Pervasive and Mobile Computing, vol. 1, no. 4, pp. 425-445, 2005.
-
(2005)
Pervasive and Mobile Computing
, vol.1
, Issue.4
, pp. 425-445
-
-
Gupta, V.1
Wurm, M.2
Zhu, Y.3
-
23
-
-
51249087814
-
Tiny ECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
St. Louis, Mo, USA, April
-
A. Liu and P. Ning, "Tiny ECC: a configurable library for elliptic curve cryptography in wireless sensor networks", in Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN'08), pp. 245-256, St. Louis, Mo, USA, April 2008.
-
(2008)
Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN'08)
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
24
-
-
74549125519
-
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography
-
X. H. Le, S. Lee, I. Butun et al., "An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography", Journal of Communications and Networks, vol. 11, no. 6, pp. 599-606, 2009.
-
(2009)
Journal of Communications and Networks
, vol.11
, Issue.6
, pp. 599-606
-
-
Le, X.H.1
Lee, S.2
Butun, I.3
-
25
-
-
69949155644
-
An efficient sensor-tosensor authenticated path-key establishment scheme for secure communications in wireless sensor networks
-
C. T. Li, M. S. Hwang, and Y. P. Chu, "An efficient sensor-tosensor authenticated path-key establishment scheme for secure communications in wireless sensor networks", International Journal of Innovative Computing, Information and Control, vol. 5, no. 8, pp. 2107-2124, 2009.
-
(2009)
International Journal of Innovative Computing, Information and Control
, vol.5
, Issue.8
, pp. 2107-2124
-
-
Li, C.T.1
Hwang, M.S.2
Chu, Y.P.3
-
27
-
-
77956128351
-
Toward trusted wireless sensor Networks
-
W. Hu, H. Tan, P. Corke, W. C. Shih, and S. Jha, "Toward trusted wireless sensor Networks", ACMTransactions on Sensor Networks, vol. 7, no. 1, article 5, 2010.
-
(2010)
ACMTransactions on Sensor Networks
, vol.7
, Issue.1
-
-
Hu, W.1
Tan, H.2
Corke, P.3
Shih, W.C.4
Jha, S.5
-
28
-
-
11244267013
-
-
Springer, New York, NY, USA
-
D. Hankerson, S. Vanstone, and A. J. Menezes, Guide to Elliptic Curve Cryptography, Springer, New York, NY, USA, 2004.
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Vanstone, S.2
Menezes, A.J.3
-
29
-
-
84934966150
-
-
Tech. Rep., Crossbow Inc.
-
"Telos B Datasheet", Tech. Rep., Crossbow Inc., 2013, http://www.datasheetarchive.com/4. Crossbow.-datasheet.html.
-
(2013)
Telos B Datasheet
-
-
-
31
-
-
70350692585
-
Securing wireless sensor networks: A survey
-
Y. Zhou, Y. Fang, and Y. Zhang, "Securing wireless sensor networks: a survey", IEEE Communications Surveys and Tutorials, vol. 10, no. 3, pp. 6-28, 2008.
-
(2008)
IEEE Communications Surveys and Tutorials
, vol.10
, Issue.3
, pp. 6-28
-
-
Zhou, Y.1
Fang, Y.2
Zhang, Y.3
-
32
-
-
84866951209
-
Node capture attack detection and defence inwireless sensor networks
-
S. H. Jokhio, I. A. Jokhio, and A. H. Kemp, "Node capture attack detection and defence inwireless sensor networks", IETWireless Sensor Systems, vol. 2, no. 3, pp. 161-169, 2012.
-
(2012)
IETWireless Sensor Systems
, vol.2
, Issue.3
, pp. 161-169
-
-
Jokhio, S.H.1
Jokhio, I.A.2
Kemp, A.H.3
-
33
-
-
84900349870
-
Certificate-based pairwise key establishment protocol for wireless sensor networks
-
Sydney, Australia, December
-
P. Porambage, P. Kumar, C. Schmitt, A. Gurtov, and M. Ylianttila, "Certificate-based pairwise key establishment protocol for wireless sensor networks", in Proceedings of 10th IEEE International Conference on Embedded Software and Systems (ICESS'13), pp. 667-674, Sydney, Australia, December 2013.
-
(2013)
Proceedings of 10th IEEE International Conference on Embedded Software and Systems (ICESS'13)
, pp. 667-674
-
-
Porambage, P.1
Kumar, P.2
Schmitt, C.3
Gurtov, A.4
Ylianttila, M.5
-
34
-
-
85101693850
-
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications
-
April
-
P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, "Two-phase authentication protocol for wireless sensor networks in distributed IoT applications", in Proceedings of the IEEE 14th International Conference on Wireless Communications and Networking (WCNC'14), pp. 2770-2775, April 2014.
-
(2014)
Proceedings of the IEEE 14th International Conference on Wireless Communications and Networking (WCNC'14)
, pp. 2770-2775
-
-
Porambage, P.1
Schmitt, C.2
Kumar, P.3
Gurtov, A.4
Ylianttila, M.5
|