-
1
-
-
33645091897
-
Sizzle: a standards-based end-to-end security architecture for the embedded internet
-
V. Gupta, M. Wurm, Y. Zhu, M. Millard, S. Fung, N. Gura, H. Eberle, and S. Chang Shantz Sizzle: a standards-based end-to-end security architecture for the embedded internet Perv. Mob. Comp. 1 2005 425 445
-
(2005)
Perv. Mob. Comp.
, vol.1
, pp. 425-445
-
-
Gupta, V.1
Wurm, M.2
Zhu, Y.3
Millard, M.4
Fung, S.5
Gura, N.6
Eberle, H.7
Chang Shantz, S.8
-
2
-
-
84883314073
-
Lithe: lightweight secure CoAP for the Internet of things
-
S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt Lithe: lightweight secure CoAP for the Internet of things Sensors J., IEEE 13 2013 3711 3720
-
(2013)
Sensors J., IEEE
, vol.13
, pp. 3711-3720
-
-
Raza, S.1
Shafagh, H.2
Hewage, K.3
Hummen, R.4
Voigt, T.5
-
3
-
-
80052447165
-
Securing communication in 6LoWPAN with compressed IPsec
-
IEEE
-
S. Raza, S. Duquennoy, T. Chung, T. Voigt, and U. Roedig Securing communication in 6LoWPAN with compressed IPsec DCOSS 2011 IEEE 1 8
-
(2011)
DCOSS
, pp. 1-8
-
-
Raza, S.1
Duquennoy, S.2
Chung, T.3
Voigt, T.4
Roedig, U.5
-
5
-
-
78650911380
-
-
RFC 7252, IETF
-
Z. Shelby, K. Hartke, C. Bormann, Constrained Application Protocol (CoAP), RFC 7252, IETF, 2014.
-
(2014)
Constrained Application Protocol (CoAP)
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
-
7
-
-
36949039907
-
A data-oriented (and beyond) network architecture
-
T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, and I. Stoica A data-oriented (and beyond) network architecture SIGCOMM Comput. Commun. Rev. 37 2007 181 192
-
(2007)
SIGCOMM Comput. Commun. Rev.
, vol.37
, pp. 181-192
-
-
Koponen, T.1
Chawla, M.2
Chun, B.-G.3
Ermolinskiy, A.4
Kim, K.H.5
Shenker, S.6
Stoica, I.7
-
8
-
-
76749083002
-
Networking named content
-
ACM
-
V. Jacobson, D.K. Smetters, J.D. Thornton, M.F. Plass, N.H. Briggs, and R.L. Braynard Networking named content Emerging Networking Experiments and Technologies 2009 ACM 1 12
-
(2009)
Emerging Networking Experiments and Technologies
, pp. 1-12
-
-
Jacobson, V.1
Smetters, D.K.2
Thornton, J.D.3
Plass, M.F.4
Briggs, N.H.5
Braynard, R.L.6
-
11
-
-
84857206147
-
SenShare: transforming sensor networks into multi-application sensing infrastructures
-
Springer
-
I. Leontiadis, C. Efstratiou, C. Mascolo, and J. Crowcroft SenShare: transforming sensor networks into multi-application sensing infrastructures Wireless Sensor Networks 2012 Springer 65 81
-
(2012)
Wireless Sensor Networks
, pp. 65-81
-
-
Leontiadis, I.1
Efstratiou, C.2
Mascolo, C.3
Crowcroft, J.4
-
12
-
-
84930765442
-
102 691 V1. 1.1 Machine-to-Machine communications (M2M)
-
T. ETSI, 102 691 V1. 1.1 Machine-to-Machine communications (M2M), Smart Metering Use Cases, 2011.
-
(2011)
Smart Metering Use Cases
-
-
Etsi, T.1
-
14
-
-
84883112893
-
Privacy preserving cloud data access with multi-authorities
-
T. Jung, X.-Y. Li, Z. Wan, M. Wan, Privacy preserving cloud data access with multi-authorities, in: INFOCOM, 2013 Proceedings IEEE, 2013, pp. 2625-2633. doi: http://dx.doi.org/10.1109/INFCOM.2013.6567070.
-
(2013)
INFOCOM, 2013 Proceedings IEEE
, pp. 2625-2633
-
-
Jung, T.1
Li, X.-Y.2
Wan, Z.3
Wan, M.4
-
15
-
-
84930759048
-
ACE use cases draft-seitz-ace-usecases-01
-
L. Seitz, S. Gerdes, G. Selander, M. Mani, S. Kumar, ACE use cases draft-seitz-ace-usecases-01, IETF work in progress, 2014.
-
(2014)
IETF work in progress
-
-
Seitz, L.1
Gerdes, S.2
Selander, G.3
Mani, M.4
Kumar, S.5
-
16
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
A. Liu, P. Ning, TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks, in: International Conference on Information Processing in Sensor Networks, 2008 (IPSN '08), 2008, pp. 245-256. doi: http://dx.doi.org/10.1109/IPSN.2008.47.
-
(2008)
International Conference on Information Processing in Sensor Networks, 2008 (IPSN '08)
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
18
-
-
84930764081
-
LCIS and Aragosystems
-
LCIS and Aragosystems, WiSMote Sensor Node, 2012. < http://wismote.org/ >.
-
(2012)
WiSMote Sensor Node
-
-
-
19
-
-
46149087550
-
Cross-level sensor network simulation with COOJA
-
IEEE
-
F. Osterlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt Cross-level sensor network simulation with COOJA Local Computer Networks 2006 IEEE 641 648 doi: http://dx.doi.org/10.1109/LCN.2006.322172
-
(2006)
Local Computer Networks
, pp. 641-648
-
-
Osterlind, F.1
Dunkels, A.2
Eriksson, J.3
Finne, N.4
Voigt, T.5
-
20
-
-
84930761442
-
GreenNet: an Energy Harvesting IP-EnabledWireless Sensor Network
-
L.-O. Varga, G. Romaniello, M. Vućinić, M. Favre, A. Banciu, R. Guizzetti, C. Planat, P. Urard, M. Heusse, F. Rousseau, O. Alphand, E. Duble, and A. Duda GreenNet: an Energy Harvesting IP-EnabledWireless Sensor Network IEEE Internet Things J. 2015
-
(2015)
IEEE Internet Things J.
-
-
Varga, L.-O.1
Romaniello, G.2
Vućinić, M.3
Favre, M.4
Banciu, A.5
Guizzetti, R.6
Planat, C.7
Urard, P.8
Heusse, M.9
Rousseau, F.10
Alphand, O.11
Duble, E.12
Duda, A.13
-
21
-
-
84908888882
-
OSCAR: object security architecture for the Internet of things
-
IEEE
-
M. Vučinić, B. Tourancheau, F. Rousseau, A. Duda, L. Damon, and R. Guizzetti OSCAR: object security architecture for the Internet of things WoWMoM 2014 IEEE 1 10
-
(2014)
WoWMoM
, pp. 1-10
-
-
Vučinić, M.1
Tourancheau, B.2
Rousseau, F.3
Duda, A.4
Damon, L.5
Guizzetti, R.6
-
22
-
-
84879548737
-
Towards viable certificate-based authentication for the Internet of things
-
ACM
-
R. Hummen, J.H. Ziegeldorf, H. Shafagh, S. Raza, and K. Wehrle Towards viable certificate-based authentication for the Internet of things Hot Topics on Wireless Net. Sec. and Privacy 2013 ACM 37 42
-
(2013)
Hot Topics on Wireless Net. Sec. and Privacy
, pp. 37-42
-
-
Hummen, R.1
Ziegeldorf, J.H.2
Shafagh, H.3
Raza, S.4
Wehrle, K.5
-
23
-
-
84930753786
-
Practical Issues with Datagram Transport Layer Security in Constrained Environments
-
K. Hartke, Practical Issues with Datagram Transport Layer Security in Constrained Environments, IETF draft, 2013.
-
(2013)
IETF draft
-
-
Hartke, K.1
-
24
-
-
84930760989
-
TZI Uni Bremen
-
O. Bergmann, TZI Uni Bremen, tinyDTLS, 2013. < http://tinydtls.sourceforge.net/ >.
-
(2013)
tinyDTLS
-
-
Bergmann, O.1
-
25
-
-
84867755083
-
End-to-end transport security in the ip-based Internet of things
-
M. Brachmann, S. L. Keoh, O. Morchon, S. Kumar, End-to-end transport security in the ip-based Internet of things, in: 2012 21st International Conference on Computer Communications and Networks (ICCCN), 2012, pp. 1-5. doi: http://dx.doi.org/10.1109/ICCCN.2012.6289292.
-
(2012)
2012 21st International Conference on Computer Communications and Networks (ICCCN)
, pp. 1-5
-
-
Brachmann, M.1
Keoh, S.L.2
Morchon, O.3
Kumar, S.4
-
26
-
-
84885304488
-
DTLS based security and two-way authentication for the Internet of things
-
T. Kothmayr, C. Schmitt, W. Hu, M. Brnig, and G. Carle DTLS based security and two-way authentication for the Internet of things Ad Hoc Netw. 11 2013 2710 2723
-
(2013)
Ad Hoc Netw.
, vol.11
, pp. 2710-2723
-
-
Kothmayr, T.1
Schmitt, C.2
Hu, W.3
Brnig, M.4
Carle, G.5
-
27
-
-
84875496381
-
On the effectiveness of end-to-end security for internet-integrated sensing applications
-
IEEE
-
J. Granjal, E. Monteiro, and J.S. Silva On the effectiveness of end-to-end security for internet-integrated sensing applications GreenCom 2012 IEEE 87 93
-
(2012)
GreenCom
, pp. 87-93
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.S.3
-
28
-
-
84890847807
-
End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication
-
J. Granjal, E. Monteiro, J. Sa Silva, End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication, in: IFIP Networking Conference, 2013, pp. 1-9.
-
(2013)
IFIP Networking Conference
, pp. 1-9
-
-
Granjal, J.1
Monteiro, E.2
Sa Silva, J.3
-
29
-
-
84904440845
-
Delegation-based authentication and authorization for the ip-based Internet of things
-
R. Hummen, H. Shafagh, S. Raza, T. Voigt, K. Wehrle, Delegation-based authentication and authorization for the ip-based Internet of things, in: IEEE SECON, 2014, pp. 1-9.
-
(2014)
IEEE SECON
, pp. 1-9
-
-
Hummen, R.1
Shafagh, H.2
Raza, S.3
Voigt, T.4
Wehrle, K.5
-
30
-
-
84874291090
-
End-to-end security for sleepy smart object networks
-
M. Sethi, J. Arkko, A. Keranen, End-to-end security for sleepy smart object networks, in: 2012 IEEE 37th Conference on Local Computer Networks Workshops (LCN Workshops), 2012, pp. 964-972. doi: http://dx.doi.org/10.1109/LCNW.2012.6424089.
-
(2012)
2012 IEEE 37th Conference on Local Computer Networks Workshops (LCN Workshops)
, pp. 964-972
-
-
Sethi, M.1
Arkko, J.2
Keranen, A.3
-
31
-
-
84883437259
-
Application-layer security for the WoT: extending CoAP to support end-to-end message security for Internet-integrated sensing applications
-
J. Granjal, E. Monteiro, and J. Silva Application-layer security for the WoT: extending CoAP to support end-to-end message security for Internet-integrated sensing applications Wired/Wireless Internet Commun. 7889 2013 140 153
-
(2013)
Wired/Wireless Internet Commun.
, vol.7889
, pp. 140-153
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.3
-
32
-
-
84880413059
-
Enforcing security mechanisms in the IP-based Internet of things: an algorithmic overview
-
S. Cirani, G. Ferrari, and L. Veltri Enforcing security mechanisms in the IP-based Internet of things: an algorithmic overview Algorithms 6 2013 197 226
-
(2013)
Algorithms
, vol.6
, pp. 197-226
-
-
Cirani, S.1
Ferrari, G.2
Veltri, L.3
-
33
-
-
84883665974
-
Authorization framework for the Internet-of-things
-
IEEE
-
L. Seitz, G. Selander, and C. Gehrmann Authorization framework for the Internet-of-things WoWMoM 2013 IEEE 1 6
-
(2013)
WoWMoM
, pp. 1-6
-
-
Seitz, L.1
Selander, G.2
Gehrmann, C.3
-
34
-
-
84930762694
-
A Datagram Transport Layer Security (DTLS) 1.2 Profile for the Internet of Things draft-ietf-dice-profile-04.txt
-
IETF work in progress
-
H. Tschofenig, A Datagram Transport Layer Security (DTLS) 1.2 Profile for the Internet of Things draft-ietf-dice-profile-04.txt, IETF work in progress, 2014.
-
(2014)
-
-
Tschofenig, H.1
-
35
-
-
84930759603
-
-
IETF work in progress
-
S. Keoh, S. Kumar, O. Garcia-Morchon, E. Dijk, A. Rahman, DTLS-based Multicast Security for Low-Power and Lossy Networks (LLNs) draft-keoh-dice-multicast-security-05, IETF work in progress, 2014.
-
(2014)
DTLS-based Multicast Security for Low-Power and Lossy Networks (LLNs) draft-keoh-dice-multicast-security-05
-
-
Keoh, S.1
Kumar, S.2
Garcia-Morchon, O.3
Dijk, E.4
Rahman, A.5
-
36
-
-
57849156679
-
-
RFC 5077, IETF
-
J. Salowey, H. Zhou, P. Eronen, H. Tschofenig, Transport Layer Security (TLS) Session Resumption without Server-Side State, RFC 5077, IETF, 2008.
-
(2008)
Transport Layer Security (TLS) Session Resumption without Server-Side State
-
-
Salowey, J.1
Zhou, H.2
Eronen, P.3
Tschofenig, H.4
|