메뉴 건너뛰기




Volumn 32, Issue , 2015, Pages 3-16

OSCAR: Object security architecture for the Internet of Things

Author keywords

Authorization; Communication security; DTLS; End to end security; Internet of Things; Object security

Indexed keywords

ARCHITECTURE; ENERGY UTILIZATION; LOW POWER ELECTRONICS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK ARCHITECTURE; SECURE COMMUNICATION;

EID: 84930767342     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2014.12.005     Document Type: Article
Times cited : (115)

References (38)
  • 2
  • 3
    • 80052447165 scopus 로고    scopus 로고
    • Securing communication in 6LoWPAN with compressed IPsec
    • IEEE
    • S. Raza, S. Duquennoy, T. Chung, T. Voigt, and U. Roedig Securing communication in 6LoWPAN with compressed IPsec DCOSS 2011 IEEE 1 8
    • (2011) DCOSS , pp. 1-8
    • Raza, S.1    Duquennoy, S.2    Chung, T.3    Voigt, T.4    Roedig, U.5
  • 9
    • 76749147837 scopus 로고    scopus 로고
    • Securing network content
    • Xerox Palo Alto Research Center-PARC
    • D. Smetters, V. Jacobson, Securing network content, Technical Report TR-2009-1, Xerox Palo Alto Research Center-PARC, 2009.
    • (2009) Technical Report TR-2009-1
    • Smetters, D.1    Jacobson, V.2
  • 10
    • 79955757995 scopus 로고    scopus 로고
    • The design and implementation of datagram TLS
    • N. Modadugu, E. Rescorla, The design and implementation of datagram TLS, in: Proceedings of ISOC NDSS, 2004, pp. 1-13.
    • (2004) Proceedings of ISOC NDSS , pp. 1-13
    • Modadugu, N.1    Rescorla, E.2
  • 11
    • 84857206147 scopus 로고    scopus 로고
    • SenShare: transforming sensor networks into multi-application sensing infrastructures
    • Springer
    • I. Leontiadis, C. Efstratiou, C. Mascolo, and J. Crowcroft SenShare: transforming sensor networks into multi-application sensing infrastructures Wireless Sensor Networks 2012 Springer 65 81
    • (2012) Wireless Sensor Networks , pp. 65-81
    • Leontiadis, I.1    Efstratiou, C.2    Mascolo, C.3    Crowcroft, J.4
  • 12
    • 84930765442 scopus 로고    scopus 로고
    • 102 691 V1. 1.1 Machine-to-Machine communications (M2M)
    • T. ETSI, 102 691 V1. 1.1 Machine-to-Machine communications (M2M), Smart Metering Use Cases, 2011.
    • (2011) Smart Metering Use Cases
    • Etsi, T.1
  • 14
    • 84883112893 scopus 로고    scopus 로고
    • Privacy preserving cloud data access with multi-authorities
    • T. Jung, X.-Y. Li, Z. Wan, M. Wan, Privacy preserving cloud data access with multi-authorities, in: INFOCOM, 2013 Proceedings IEEE, 2013, pp. 2625-2633. doi: http://dx.doi.org/10.1109/INFCOM.2013.6567070.
    • (2013) INFOCOM, 2013 Proceedings IEEE , pp. 2625-2633
    • Jung, T.1    Li, X.-Y.2    Wan, Z.3    Wan, M.4
  • 18
    • 84930764081 scopus 로고    scopus 로고
    • LCIS and Aragosystems
    • LCIS and Aragosystems, WiSMote Sensor Node, 2012. < http://wismote.org/ >.
    • (2012) WiSMote Sensor Node
  • 23
    • 84930753786 scopus 로고    scopus 로고
    • Practical Issues with Datagram Transport Layer Security in Constrained Environments
    • K. Hartke, Practical Issues with Datagram Transport Layer Security in Constrained Environments, IETF draft, 2013.
    • (2013) IETF draft
    • Hartke, K.1
  • 24
    • 84930760989 scopus 로고    scopus 로고
    • TZI Uni Bremen
    • O. Bergmann, TZI Uni Bremen, tinyDTLS, 2013. < http://tinydtls.sourceforge.net/ >.
    • (2013) tinyDTLS
    • Bergmann, O.1
  • 26
    • 84885304488 scopus 로고    scopus 로고
    • DTLS based security and two-way authentication for the Internet of things
    • T. Kothmayr, C. Schmitt, W. Hu, M. Brnig, and G. Carle DTLS based security and two-way authentication for the Internet of things Ad Hoc Netw. 11 2013 2710 2723
    • (2013) Ad Hoc Netw. , vol.11 , pp. 2710-2723
    • Kothmayr, T.1    Schmitt, C.2    Hu, W.3    Brnig, M.4    Carle, G.5
  • 27
    • 84875496381 scopus 로고    scopus 로고
    • On the effectiveness of end-to-end security for internet-integrated sensing applications
    • IEEE
    • J. Granjal, E. Monteiro, and J.S. Silva On the effectiveness of end-to-end security for internet-integrated sensing applications GreenCom 2012 IEEE 87 93
    • (2012) GreenCom , pp. 87-93
    • Granjal, J.1    Monteiro, E.2    Silva, J.S.3
  • 28
    • 84890847807 scopus 로고    scopus 로고
    • End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication
    • J. Granjal, E. Monteiro, J. Sa Silva, End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication, in: IFIP Networking Conference, 2013, pp. 1-9.
    • (2013) IFIP Networking Conference , pp. 1-9
    • Granjal, J.1    Monteiro, E.2    Sa Silva, J.3
  • 29
    • 84904440845 scopus 로고    scopus 로고
    • Delegation-based authentication and authorization for the ip-based Internet of things
    • R. Hummen, H. Shafagh, S. Raza, T. Voigt, K. Wehrle, Delegation-based authentication and authorization for the ip-based Internet of things, in: IEEE SECON, 2014, pp. 1-9.
    • (2014) IEEE SECON , pp. 1-9
    • Hummen, R.1    Shafagh, H.2    Raza, S.3    Voigt, T.4    Wehrle, K.5
  • 31
    • 84883437259 scopus 로고    scopus 로고
    • Application-layer security for the WoT: extending CoAP to support end-to-end message security for Internet-integrated sensing applications
    • J. Granjal, E. Monteiro, and J. Silva Application-layer security for the WoT: extending CoAP to support end-to-end message security for Internet-integrated sensing applications Wired/Wireless Internet Commun. 7889 2013 140 153
    • (2013) Wired/Wireless Internet Commun. , vol.7889 , pp. 140-153
    • Granjal, J.1    Monteiro, E.2    Silva, J.3
  • 32
    • 84880413059 scopus 로고    scopus 로고
    • Enforcing security mechanisms in the IP-based Internet of things: an algorithmic overview
    • S. Cirani, G. Ferrari, and L. Veltri Enforcing security mechanisms in the IP-based Internet of things: an algorithmic overview Algorithms 6 2013 197 226
    • (2013) Algorithms , vol.6 , pp. 197-226
    • Cirani, S.1    Ferrari, G.2    Veltri, L.3
  • 33
    • 84883665974 scopus 로고    scopus 로고
    • Authorization framework for the Internet-of-things
    • IEEE
    • L. Seitz, G. Selander, and C. Gehrmann Authorization framework for the Internet-of-things WoWMoM 2013 IEEE 1 6
    • (2013) WoWMoM , pp. 1-6
    • Seitz, L.1    Selander, G.2    Gehrmann, C.3
  • 34
    • 84930762694 scopus 로고    scopus 로고
    • A Datagram Transport Layer Security (DTLS) 1.2 Profile for the Internet of Things draft-ietf-dice-profile-04.txt
    • IETF work in progress
    • H. Tschofenig, A Datagram Transport Layer Security (DTLS) 1.2 Profile for the Internet of Things draft-ietf-dice-profile-04.txt, IETF work in progress, 2014.
    • (2014)
    • Tschofenig, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.