-
1
-
-
84876943063
-
Internet of things (IoT): A vision, architectural elements, and future directions
-
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of things (IoT): a vision, architectural elements, and future directions, " Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
2
-
-
84893602968
-
-
White Paper, Cisco
-
J. Bradly, J. Barbier, and D. Handler, "Embracing the internet of everything to capture your share of $ 14.4 Trillion, "White Paper, Cisco, 2013.
-
(2013)
Embracing the Internet of Everything to Capture Your Share of $ 14.4 Trillion
-
-
Bradly, J.1
Barbier, J.2
Handler, D.3
-
3
-
-
84887362165
-
Terminology for constrained-node networks
-
C. Bormann, M. Ersue, and A. Keranen, "Terminology for constrained-node networks, " RFC 7228, Internet Engineering Task Force (IETF), 2014.
-
(2014)
RFC 7228, Internet Engineering Task Force (IETF)
-
-
Bormann, C.1
Ersue, M.2
Keranen, A.3
-
4
-
-
84879533211
-
6LoWPAN fragmentation attacks and mitigation mechanisms
-
ACM, April
-
R. Hummen, J. Hiller, H. Wirtz, M. Henze, H. Shafagh, and K. Wehrle, "6LoWPAN fragmentation attacks and mitigation mechanisms, " in Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13), pp. 55-66, ACM, April 2013.
-
(2013)
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)
, pp. 55-66
-
-
Hummen, R.1
Hiller, J.2
Wirtz, H.3
Henze, M.4
Shafagh, H.5
Wehrle, K.6
-
5
-
-
78650911380
-
The constrained application protocol (CoAP)
-
Z. Shelby, K. Hartke, and C. Bormann, "The constrained application protocol (CoAP), " RFC 7252, IETF, 2014.
-
(2014)
RFC 7252, IETF
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
-
7
-
-
33746613037
-
Datagram transport layer security version 1.2
-
E. Rescorla and N. Modadugu, "Datagram transport layer security version 1.2, " RFC 6347, IETF, 2012.
-
(2012)
RFC 6347, IETF
-
-
Rescorla, E.1
Modadugu, N.2
-
10
-
-
84941231988
-
Compression of record and handshake headers for constrained environments
-
S. Raza, H. Shafagh, and O. Dupont, "Compression of Record and Handshake Headers for Constrained Environments, " IETF, http://tools.ietf.org/html/draft-raza-dice-compressed-dtls-00.
-
IETF
-
-
Raza, S.1
Shafagh, H.2
Dupont, O.3
-
11
-
-
84879548737
-
Towards viable certificate-based authentication for the Internet of Things
-
Budapest, Hungary, April
-
R. Hummen, J. H. Ziegeldorf, H. Shafagh, S. Raza, and K. Wehrle, "Towards viable certificate-based authentication for the Internet of Things, " in Proceedings of the 2nd ACMWorkshop on Hot Topics onWireless Network Security and Privacy (HotWiSec '13), pp. 37-41, Budapest, Hungary, April 2013.
-
(2013)
Proceedings of the 2nd ACMWorkshop on Hot Topics OnWireless Network Security and Privacy (HotWiSec '13)
, pp. 37-41
-
-
Hummen, R.1
Ziegeldorf, J.H.2
Shafagh, H.3
Raza, S.4
Wehrle, K.5
-
12
-
-
84941231989
-
Practical issues with datagram transport layer security in constrained environments
-
K. Hartke, "Practical issues with datagram transport layer security in constrained environments, " Internet Draft, IETF, 2014.
-
(2014)
Internet Draft, IETF
-
-
Hartke, K.1
-
13
-
-
84920139330
-
-
Internet Draft, IETF
-
S. Gerdes, O. Bergmann, and C. Bormann, Delegated CoAP Authentication and Authorization Framework (DCAF), Internet Draft, IETF, 2014.
-
(2014)
Delegated CoAP Authentication and Authorization Framework (DCAF)
-
-
Gerdes, S.1
Bergmann, O.2
Bormann, C.3
-
14
-
-
84873418456
-
CoRE resource directory
-
Z. Shelby, C. Bormann, and S. Krco, "CoRE resource directory, " Internet Draft, IETF, 2014.
-
(2014)
Internet Draft, IETF
-
-
Shelby, Z.1
Bormann, C.2
Krco, S.3
-
15
-
-
83555176391
-
Security challenges in the IP-based Internet of Things
-
T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar, and K. Wehrle, "Security challenges in the IP-based Internet of Things, " Wireless Personal Communications, vol. 61, no. 3, pp. 527-542, 2011.
-
(2011)
Wireless Personal Communications
, vol.61
, Issue.3
, pp. 527-542
-
-
Heer, T.1
Garcia-Morchon, O.2
Hummen, R.3
Keoh, S.L.4
Kumar, S.S.5
Wehrle, K.6
-
16
-
-
62149118079
-
The EAP-PSK protocol: A preshared key extensible authentication protocol (EAP) method
-
F. Bersani and H. Tschofenig, "The EAP-PSK protocol: a preshared key extensible authentication protocol (EAP) method, " RFC 4764, IETF, 2007.
-
(2007)
RFC 4764, IETF
-
-
Bersani, F.1
Tschofenig, H.2
-
17
-
-
84883314073
-
Lithe: Lightweight secureCoAP for the internet of things
-
S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: lightweight secureCoAP for the internet of things, " IEEE Sensors Journal, vol. 13, no. 10, pp. 3711-3720, 2013.
-
(2013)
IEEE Sensors Journal
, vol.13
, Issue.10
, pp. 3711-3720
-
-
Raza, S.1
Shafagh, H.2
Hewage, K.3
Hummen, R.4
Voigt, T.5
-
18
-
-
20544456753
-
Contiki - A lightweight and flexible operating system for tiny networked sensors
-
IEEE, Tampa, Fla, USA, November
-
A. Dunkels, B. Grönvall, and T. Voigt, "Contiki - a lightweight and flexible operating system for tiny networked sensors, " in Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, pp. 455-462, IEEE, Tampa, Fla, USA, November 2004.
-
(2004)
Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
, pp. 455-462
-
-
Dunkels, A.1
Grönvall, B.2
Voigt, T.3
-
19
-
-
83355168853
-
Powertrace: Network-level power profiling for low-power wireless networks
-
A. Dunkels, J. Eriksson, N. Finne, and N. Tsiftes, "Powertrace: network-level power profiling for low-power wireless networks, " SICS Technical Report T2011:05, 2011.
-
(2011)
SICS Technical Report T2011:05
-
-
Dunkels, A.1
Eriksson, J.2
Finne, N.3
Tsiftes, N.4
|