-
1
-
-
84876943063
-
Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions
-
Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions. FutureGener. Comput. Syst. 2013, 29, 1645-1660
-
(2013)
Futuregener. Comput. Syst
, vol.29
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
2
-
-
85051578985
-
Standardization in the field of the internet of things (IoT)
-
Ishaq, I.; Carels, D.; Teklemariam, G.K.; Hoebeke, J.; Abeele, F.V.D.; Poorter, E.D.; Moerman, I.; Demeester, P. IETF standardization in the field of the internet of things (IoT): A survey. J.Sens.ActuatorNetw. 2013, 2, 235-287
-
(2013)
A Survey. J.Sens.Actuatornetw.
, vol.2
, pp. 235-287
-
-
Ishaq, I.1
Carels, D.2
Teklemariam, G.K.3
Hoebeke, J.4
Abeele, F.V.D.5
Poorter, E.D.6
Moerman, I.7
Demeester, P.8
-
3
-
-
84881312915
-
Standardized protocol stack for the internet of (Important) things
-
Palattella, M.R.; Accettura, N.; Vilajosana, X.; Watteyne, T.; Grieco, L.A.; Boggia, G.; Dohler, M. Standardized protocol stack for the internet of (important) things. IEEE Commun. Surv. Tutor. 2013, 15, 1389-1406
-
(2013)
IEEE Commun. Surv. Tutor
, vol.15
, pp. 1389-1406
-
-
Palattella, M.R.1
Accettura, N.2
Vilajosana, X.3
Watteyne, T.4
Grieco, L.A.5
Boggia, G.6
Dohler, M.7
-
6
-
-
84867006336
-
Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology
-
Gomez, C.; Oller, J.; Paradells, J. Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology. Sensors 2012, 12, 11734-11753
-
(2012)
Sensors
, vol.12
, pp. 11734-11753
-
-
Gomez, C.1
Oller, J.2
Paradells, J.3
-
8
-
-
84880413059
-
Enforcing security mechanisms in the IP-based internet of things
-
Cirani, S.; Ferrari, G.; Veltri, L. Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview. Algorithms 2013, 6, 197-226
-
(2013)
An Algorithmic Overview. Algorithms
, vol.6
, pp. 197-226
-
-
Cirani, S.1
Ferrari, G.2
Veltri, L.3
-
9
-
-
84863713348
-
-
accessed on 7 March 2016
-
Garcia-Morchon, O.; Kumar, S.; Keoh, S.; Hummen, R.; Struik, R. Security Considerations in the IP-Based Internet of Things.Available online: https://tools.ietf.org/html/draft-garcia-core-security-06 (accessed on 7 March 2016).
-
Security Considerations in the Ip-Based Internet of Things
-
-
Garcia-Morchon, O.1
Kumar, S.2
Keoh, S.3
Hummen, R.4
Struik, R.5
-
10
-
-
85026974615
-
-
IoT Discovery and Federation Controls Lacking, accessed on 7 March 2016)
-
IoT Discovery and Federation Controls Lacking.Available online: http://searchsecurity.techtarget.com/news/4500244846/IoT-discovery-and-federation-controls-lacking (accessed on 7 March 2016).
-
-
-
-
11
-
-
33645352668
-
-
De Laat, C.; Gross, G.; Gommans, L.; Vollbrecht, J.; Spence, D. Generic AAA Architecture. Available online: http://www.hjp.at/doc/rfc/rfc2903.html(accessed on 1 March 2016).
-
Generic AAA Architecture
-
-
De Laat, C.1
Gross, G.2
Gommans, L.3
Vollbrecht, J.4
Spence, D.5
-
12
-
-
13244299564
-
-
accessed on 2 March 2016
-
Aboba, B.; Blunk, L.; Vollbrecht, J.; Carlson, J.; Levkowetz, H. Extensible Authentication Protocol (EAP).Avaiable online: http://www.hjp.at/doc/rfc/rfc2903.html(accessed on 2 March 2016).
-
Extensible Authentication Protocol (EAP).
-
-
Aboba, B.1
Blunk, L.2
Vollbrecht, J.3
Carlson, J.4
Levkowetz, H.5
-
15
-
-
83555176391
-
Security Challenges in the IP-Based Internet of Things
-
Heer, T.; Garcia-Morchon, O.; Hummen, R.; Keoh, S.L.; Kumar, S.S.; Wehrle, K. Security Challenges in the IP-Based Internet of Things. Wirel. Pers. Commun. 2011, 61, 527-542
-
(2011)
Wirel. Pers. Commun.
, vol.61
, pp. 527-542
-
-
Heer, T.1
Garcia-Morchon, O.2
Hummen, R.3
Keoh, S.L.4
Kumar, S.S.5
Wehrle, K.6
-
18
-
-
84944321845
-
-
. RFC 6733 (Proposed Standard),, accessed on 2 March 2016
-
Fajardo, V.; Arkko, J.; Loughney, J.; Zorn, G. Diameter Base Protocol. RFC 6733 (Proposed Standard), 2012. Updated by RFC 7075. Available online: https://tools.ietf.org/html/rfc6733 (accessed on 2 March 2016).
-
(2012)
Diameter Base Protocol
-
-
Fajardo, V.1
Arkko, J.2
Loughney, J.3
Zorn, G.4
-
19
-
-
3142658616
-
Interworking techniques and architectures for WLAN/3G integration toward 4G mobile data networks
-
Salkintzis, A.K. Interworking techniques and architectures for WLAN/3G integration toward 4G mobile data networks. IEEE Wirel. Commun. 2004, 11, 50-61
-
(2004)
IEEE Wirel. Commun
, vol.11
, pp. 50-61
-
-
Salkintzis, A.K.1
-
20
-
-
77954003918
-
Eduroam: Past, present and future. Comput. Methods Sci
-
Wierenga, K.; Florio, L. Eduroam: Past, present and future. Comput. Methods Sci. Technol. 2005, 11, 169-173
-
(2005)
Technol
, vol.11
, pp. 169-173
-
-
Wierenga, K.1
Florio, L.2
-
21
-
-
85026975691
-
Remote Authentication Dial in User Service (RADIUS). RFC 2865 (Draft Standard), 2000
-
accessed on 2 March 2016
-
Rigney, C.; Willens, S.; Rubens, A.; Simpson, W. Remote Authentication Dial in User Service (RADIUS). RFC 2865 (Draft Standard), 2000. Updated by RFCs 2868, 3575, 5080, 6929. Available online: https://tools.ietf.org/html/rfc2865 (accessed on 2 March 2016).
-
(2016)
Updated by Rfcs
, vol.3575
, Issue.5080
, pp. 6929
-
-
Rigney, C.1
Willens, S.2
Rubens, A.3
Simpson, W.4
-
23
-
-
85026975531
-
-
ZigBee Alliance: USA, accessed on 2 March 2016
-
ZigBee IP Specification—ZigBee Document 095023r34; ZigBee Alliance: USA, 2014. Available online: http://www.zigbee.org/zigbee-for-developers/network-specifications/zigbeeip/(accessed on 2 March 2016).
-
(2014)
Zigbee IP Specification—ZigBee Document 095023R34
-
-
-
24
-
-
46149087550
-
Cross-Level Sensor Network Simulation with COOJA
-
Tampa, FL, USA
-
Osterlind, F.; Dunkels, A.; Eriksson, J.; Finne, N.; Voigt, T. Cross-Level Sensor Network Simulation with COOJA. In Proceedings of the 2006 31st IEEE Conference on Local Computer Networks, Tampa, FL, USA, 14-16 November 2006. pp. 641-648
-
(2006)
In Proceedings of the 2006 31St IEEE Conference on Local Computer Networks
, vol.14-16
, pp. 641-648
-
-
Osterlind, F.1
Dunkels, A.2
Eriksson, J.3
Finne, N.4
Voigt, T.5
-
25
-
-
84887348851
-
Panatiki: A network access control implementation based on PANA for IoT devices
-
Sanchez, P.M.; Lopez, R.M.; Skarmeta, A.F.G. Panatiki: A network access control implementation based on PANA for IoT devices. Sensors 2013, 13, 14888-14917
-
(2013)
Sensors
, vol.13
, pp. 14888-14917
-
-
Sanchez, P.M.1
Lopez, R.M.2
Skarmeta, A.F.G.3
-
26
-
-
33947675810
-
A network access control approach based on the AAA architecture and authorization attributes
-
López, G.; Cánovas, O.; Gómez, A.F.; Jiménez, J.D.; Marín, R. A network access control approach based on the AAA architecture and authorization attributes. J. Netw. Comput. Appl. 2007, 30, 900-919
-
(2007)
J. Netw. Comput. Appl.
, vol.30
, pp. 900-919
-
-
López, G.1
Cánovas, O.2
Gómez, A.F.3
Jiménez, J.D.4
Marín, R.5
-
27
-
-
85026976410
-
RADIUS Accounting. RFC 2866 (Informational), 2000
-
accessed on 3 March 2016
-
Rigney, C. RADIUS Accounting. RFC 2866 (Informational), 2000. Updated by RFCs 2867, 5080, 5997. Available online: https://tools.ietf.org/html/rfc2866 (accessed on 3 March 2016).
-
Updated by Rfcs
-
-
Rigney, C.1
-
28
-
-
85026981248
-
Stream Control Transmission Protocol. RFC 4960 (Proposed Standard)
-
(accessed on 3 March 2016
-
Stewart, R. Stream Control Transmission Protocol. RFC 4960 (Proposed Standard), 2007. Updated by RFCs 6096, 6335, 7053. Available online: https://tools.ietf.org/html/rfc4960 (accessed on 3 March 2016).
-
(2007)
Updated by Rfcs
, vol.6096
, Issue.6335
-
-
Stewart, R.1
-
29
-
-
85026976551
-
Security Architecture for the Internet Protocol. RFC 4301 (Proposed Standard)
-
accessed on 3 March 2016
-
Kent, S.; Seo, K. Security Architecture for the Internet Protocol. RFC 4301 (Proposed Standard), 2005. Updated by RFCs 6040, 7619. Available online: http://www.hjp.at/doc/rfc/rfc4301.html (accessed on 3 March 2016).
-
(2005)
Updated by Rfcs
, vol.6040
, pp. 7619
-
-
Kent, S.1
Seo, K.2
-
30
-
-
77956573382
-
The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard)
-
accessed on 3 March 2016
-
Dierks, T.; Rescorla, E. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), 2008. Updated by RFCs 5746, 5878, 6176, 7465, 7507, 7568, 7627, 7685. Available online: https://tools.ietf.org/html/rfc5246 (accessed on 3 March 2016).
-
(2008)
Updated by Rfcs
-
-
Dierks, T.1
Rescorla, E.2
-
32
-
-
33846610677
-
Methods for Wireless Networks. Comput. Stand
-
Dantu, R.; Clothier, G.; Atri, A. EAP Methods for Wireless Networks. Comput. Stand. Interfaces 2007, 29, 289-301
-
(2007)
Interfaces
, vol.29
, pp. 289-301
-
-
Dantu, R.1
Clothier, G.2
Atri, A.3
-
33
-
-
85034844503
-
-
RFC 7542 (Proposed Standard),, accessed on 3 March 2016
-
DeKok, A. The Network Access Identifier. RFC 7542 (Proposed Standard), 2015. Available online: http://tools.ietf.org/html/rfc2486 (accessed on 3 March 2016).
-
(2015)
The Network Access Identifier.
-
-
Dekok, A.1
-
34
-
-
85026975639
-
A GSS-API Mechanism for the Extensible Authentication Protocol
-
accessed on 3 March 2016
-
Hartman, S.; Howlett, J. A GSS-API Mechanism for the Extensible Authentication Protocol. RFC 7055 (Proposed Standard), 2013. Available online: https://tools.ietf.org/html/rfc7055 (accessed on 3 March 2016).
-
(2013)
RFC 7055 (Proposed Standard)
-
-
Hartman, S.1
Howlett, J.2
-
35
-
-
84858171962
-
Coap: An application protocol for billions of tiny internet nodes
-
Bormann, C.; Castellani, A.P.; Shelby, Z. Coap: An application protocol for billions of tiny internet nodes. IEEE Int. Comput. 2012, 16, 62-67
-
(2012)
IEEE Int. Comput
, vol.16
, pp. 62-67
-
-
Bormann, C.1
Castellani, A.P.2
Shelby, Z.3
-
36
-
-
85026979847
-
RESTful Web Services; O’Reilly Media, Inc.: Sebastopol, CA
-
Richardson, L.; Ruby, S. RESTful Web Services; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2008
-
(2008)
USA
-
-
Richardson, L.1
Ruby, S.2
-
38
-
-
85026980185
-
-
accessed on 7 March 2016
-
Wang, Q.; Vilajosana, X.; Watteyne, T.; Sudhaakar, R.; Zand, P. Transporting CoAP Messages over IEEE802.15.4e Information Elements. Available online: https://tools.ietf.org/html/draft-wang-6tisch-6top-coapie-01.txt (accessed on 7 March 2016).
-
Transporting Coap Messages over Ieee802.15.4E Information Elements
-
-
Wang, Q.1
Vilajosana, X.2
Watteyne, T.3
Sudhaakar, R.4
Zand, P.5
-
39
-
-
85026980696
-
Bootstrap Protocol. RFC 951 (Draft Standard), 1985
-
accessed on 7 March 2016
-
Croft, W.; Gilmore, J. Bootstrap Protocol. RFC 951 (Draft Standard), 1985. Updated by RFCs 1395, 1497, 1532, 1542, 5494. Available online: http://www.hjp.at/doc/rfc/rfc951.html (accessed on 7 March 2016).
-
Updated by Rfcs
-
-
Croft, W.1
Gilmore, J.2
-
40
-
-
84889360026
-
-
; John Wiley & Sons: Hoboken, NJ, USA
-
Nakhjiri, M. AAA and Network Security for Mobile Access: RADIUS, Diameter, EAP, PKI and IP mobility; John Wiley & Sons: Hoboken, NJ, USA, 2005
-
(2005)
AAA and Network Security for Mobile Access: RADIUS, Diameter, EAP, PKI and IP Mobility
-
-
Nakhjiri, M.1
-
43
-
-
67650697450
-
Mobile IPv6 Bootstrapping in Split Scenario
-
accessed on 7 March 2016
-
Giaretta, G.; Kempf, J.; Devarapalli, V. Mobile IPv6 Bootstrapping in Split Scenario. RFC 5026 (Proposed Standard), 2007. Available online: http://www.hjp.at/doc/rfc/rfc5026.html (accessed on 7 March 2016).
-
(2007)
RFC 5026 (Proposed Standard)
-
-
Giaretta, G.1
Kempf, J.2
Devarapalli, V.3
-
44
-
-
85026980371
-
-
Kaufman, C.; Hoffman, P.; Nir, Y.; Eronen, P.; Kivinen, T. Internet Key Exchange Protocol Version 2 (IKEv2). RFC 7296 (INTERNET STANDARD), 2014. Updated by RFCs 7427, 7670. Available online: http://www.hjp.at/doc/rfc/rfc7296.html (accessed on 7 March 2016).
-
(2014)
Internet Key Exchange Protocol Version 2 (Ikev2). RFC 7296 (INTERNET STANDARD)
, vol.7427
, pp. 7670
-
-
Kaufman, C.1
Hoffman, P.2
Nir, Y.3
Eronen, P.4
Kivinen, T.5
-
45
-
-
85026974604
-
Arbaugh,W. Authentication for DHCP Messages
-
accessed on 7 March 2016
-
Droms, R.; Arbaugh,W. Authentication for DHCP Messages. RFC 3118 (Proposed Standard), 2001. Available online: http://tools.ietf.org/html/rfc3118.html (accessed on 7 March 2016).
-
(2001)
RFC 3118 (Proposed Standard)
-
-
Droms, R.1
-
47
-
-
85026975625
-
-
3GPP TS 33.220 : Generic Authentication Architecture (GAA);, accessed on 7 March 2016
-
3GPP TS 33.220 : Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA). Available online: http://www.3gpp.org/DynaReport/33220.htm (accessed on 7 March 2016).
-
Generic Bootstrapping Architecture (GBA)
-
-
-
52
-
-
84944066745
-
802.15.4e Time-Slotted Channel Hopping (TSCH) in the Internet of Things (IoT): Problem Statement
-
accessed on 7 March 2016
-
Watteyne, T.; Palattella, M.; Grieco, L. Using IEEE 802.15.4e Time-Slotted Channel Hopping (TSCH) in the Internet of Things (IoT): Problem Statement. RFC 7554 (Informational), 2015. Available online: https://tools.ietf.org/html/rfc7554 (accessed on 7 March 2016).
-
(2015)
RFC 7554 (Informational)
-
-
Watteyne, T.1
Palattella, M.2
Grieco, L.3
Using, I.4
-
54
-
-
84960352240
-
-
IETF - 6BAND (6lo Bootstrapping, Access for Networked Devices) Mailing List, accessed on 7 March 2016
-
IETF - 6BAND (6lo Bootstrapping, Access for Networked Devices) Mailing List. Available online: https://www.ietf.org/mailman/listinfo/6band (accessed on 7 March 2016).
-
-
-
-
55
-
-
33748606726
-
-
RFC 5191 (Proposed Standard),, Updated by RFC 5872
-
Forsberg, D.; Ohba, Y.; Patil, B.; Tschofenig, H.; Yegin, A. Protocol for Carrying Authentication for Network Access (PANA). RFC 5191 (Proposed Standard), 2008. Updated by RFC 5872. Available online: http://www.rfc-editor.org/info/rfc5191 (accessed on 7 March 2016).
-
(2008)
Protocol for Carrying Authentication for Network Access (PANA).
-
-
Forsberg, D.1
Ohba, Y.2
Patil, B.3
Tschofenig, H.4
Yegin, A.5
-
56
-
-
85026980637
-
-
(accessed on 7 March 2016
-
O’Flynn, C.P.; Sarikaya, B.; Ohba, Y.; Cao, Z.; Cragie, R. Security Bootstrapping of Resource-Constrained Devices. Available online: https://tools.ietf.org/html/draft-oflynn-core-bootstrapping-03 (accessed on 7 March 2016).
-
Security Bootstrapping of Resource-Constrained Devices
-
-
O’Flynn, C.P.1
Sarikaya, B.2
Ohba, Y.3
Cao, Z.4
Cragie, R.5
-
57
-
-
84858143825
-
Network Access Security for the Internet: Protocol for Carrying Authentication for Network Access
-
Marin-Lopez, R.; Pereniguez-Garcia, F.; Gomez-Skarmeta, F.; Ohba, Y. Network Access Security for the Internet: Protocol for Carrying Authentication for Network Access. IEEE Commun. Mag. 2012, 3, 84-92
-
(2012)
IEEE Commun. Mag
, vol.3
, pp. 84-92
-
-
Marin-Lopez, R.1
Pereniguez-Garcia, F.2
Gomez-Skarmeta, F.3
Ohba, Y.4
-
59
-
-
85026980637
-
-
accessed on 7 March 2016
-
Sarikaya, B.; Cragie, R.; Moskowitz, R.; Ohba, Y.; Cao, Z. Security Bootstrapping Solution for Resource-Constrained Devices. Available online: https://tools.ietf.org/html/draft-sarikaya-coresbootstrapping-05 (accessed on 7 March 2016).
-
Security Bootstrapping Solution for Resource-Constrained Devices
-
-
Sarikaya, B.1
Cragie, R.2
Moskowitz, R.3
Ohba, Y.4
Cao, Z.5
-
60
-
-
20544456753
-
Contiki— A lightweight and flexible operating system for tiny networked sensors
-
, Dallas, TX, USA
-
Dunkels, A.; Gronval, B.; Voigt, T. Contiki— A lightweight and flexible operating system for tiny networked sensors. In Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, Dallas, TX, USA, 16-18 November 2004
-
(2004)
Proceedings of the 29Th Annual IEEE International Conference on Local Computer Networks
, pp. 16-18
-
-
Dunkels, A.1
Gronval, B.2
Voigt, T.3
-
63
-
-
85026975527
-
1.1 (2011-10): “Machine-to-Machine Communications (M2M); Functional Architecture”
-
accessed 7 March 2016)
-
ETSI. 102 690 V1 1.1 (2011-10): “Machine-to-Machine Communications (M2M); Functional Architecture”; ETSI: France, 2011. Available online: http://www.etsi.org/deliver/etsi_ts/102600_102699/102690/01.01.01_60/ts_102690v010101p.pdf (accessed 7 March 2016).
-
(2011)
ETSI: France
-
-
-
64
-
-
84879546251
-
Securing the IP-based internet of things with HIP and DTLS. In Proceedings of the Sixth ACM Conference on Security and privacy in wireless and mobile networks, Budapest
-
Garcia-Morchon, O.; Keoh, S.L.; Kumar, S.; Moreno-Sanchez, P.; Vidal-Meca, F.; Ziegeldorf, J.H. Securing the IP-based internet of things with HIP and DTLS. In Proceedings of the Sixth ACM Conference on Security and privacy in wireless and mobile networks, Budapest, Hungary, 17-19 April 2013; pp. 119-124
-
(2013)
Hungary
, vol.17-19
, pp. 119-124
-
-
Garcia-Morchon, O.1
Keoh, S.L.2
Kumar, S.3
Moreno-Sanchez, P.4
Vidal-Meca, F.5
Ziegeldorf, J.H.6
-
65
-
-
84863698729
-
Secure bootstrapping of nodes in a CoAP network
-
Bergmann, O.; Gerdes, S.; Schäfer, S.; Junge, F.; Bormann, C. Secure bootstrapping of nodes in a CoAP network. In Proceedings of the 2012 IEEEWireless Communications and Networking ConferenceWorkshops (WCNCW), Paris, France, 1 April 2012; pp. 220-225
-
In Proceedings of the 2012 Ieeewireless Communications and Networking Conferenceworkshops (WCNCW), Paris, France, 1 April
, vol.2012
, pp. 220-225
-
-
Bergmann, O.1
Gerdes, S.2
Schäfer, S.3
Junge, F.4
Bormann, C.5
-
67
-
-
84969862486
-
Implementing LWM2M in constrained IoT devices. In Proceedings of the
-
Rao, S.; Chendanda, D.; Deshpande, C.; Lakkundi, V. Implementing LWM2M in constrained IoT devices. In Proceedings of the 2015 IEEE Conference onWireless Sensors (ICWiSe), Melaka, Malaysia, 24-26 August 2015; pp. 52-57
-
(2015)
IEEE Conference Onwireless Sensors (Icwise), Melaka, Malaysia, 24-26 August
, vol.2015
, pp. 52-57
-
-
Rao, S.1
Chendanda, D.2
Deshpande, C.3
Lakkundi, V.4
-
69
-
-
85026983074
-
-
accessed on 7 March 2016
-
Web of Things Security. Available online: https://github.com/w3c/web-of-things-framework/blob/master/security.md (accessed on 7 March 2016).
-
Web of Things Security
-
-
-
71
-
-
85026981212
-
Mobile Provided Identity Authentication on the Web
-
Hogberg, J. Mobile Provided Identity Authentication on the Web. In Proceedings of the W3C Workshop on Identity in the Browser, Mountain View, CA, USA, 24-25 May 2011
-
(2011)
Proceedings of the W3C Workshop on Identity in the Browser, Mountain View, CA, USA, 24-25
-
-
Hogberg, J.1
-
73
-
-
85026977796
-
-
accessed on 7 March 2016
-
Erdtman, S.; Wahlstroem, E.; Selander, G.; Seitz, L.; Tschofenig, H. Authorization for the Internet of Things using OAuth 2.0. Available online: https://tools.ietf.org/html/draft-ietf-ace-oauth-authz-01 (accessed on 7 March 2016).
-
Authorization for the Internet of Things Using Oauth 2.0
-
-
Erdtman, S.1
Wahlstroem, E.2
Selander, G.3
Seitz, L.4
Tschofenig, H.5
-
74
-
-
84958048329
-
DTLS Performance in Duty-Cycled Networks
-
), Hong Kong, China, 30 August-2
-
Vucinic, M.; Tourancheau, B.; Watteyne, T.; Rousseau, F.; Duda, A.; Guizzetti, R.; Damon, L. DTLS Performance in Duty-Cycled Networks. In Proceedings of the 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Hong Kong, China, 30 August-2 September 2015
-
(2015)
Proceedings of the 2015 IEEE 26Th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC
-
-
Vucinic, M.1
Tourancheau, B.2
Watteyne, T.3
Rousseau, F.4
Duda, A.5
Guizzetti, R.6
Damon, L.7
-
76
-
-
84958538660
-
Low power wide area machine-to-machine networks: Key techniques and prototype
-
Xiong, X.; Zheng, K.; Xu, R.; Xiang, W.; Chatzimisios, P. Low power wide area machine-to-machine networks: Key techniques and prototype. IEEE Commun. Mag. 2015, 53, 64-71
-
(2015)
IEEE Commun. Mag
, vol.53
, pp. 64-71
-
-
Xiong, X.1
Zheng, K.2
Xu, R.3
Xiang, W.4
Chatzimisios, P.5
-
77
-
-
80052380132
-
The Advanced Encryption Standard-Cipher-Based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE)
-
(accessed on 7 March 2016
-
Song, J.; Poovendran, R.; Lee, J.; Iwata, T. The Advanced Encryption Standard-Cipher-Based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE). RFC 4615 (Proposed Standard), 2006. Available online: http://www.rfc-editor.org/info/rfc4615 (accessed on 7 March 2016).
-
(2006)
RFC 4615 (Proposed Standard)
-
-
Song, J.1
Poovendran, R.2
Lee, J.3
Iwata, T.4
-
79
-
-
35048833291
-
Selected Areas in Cryptography
-
SAC 2004, Waterloo, ON, Canada, 9-10
-
Billet, O.; Gilbert, H.; Ech-Chatbi, C. Selected Areas in Cryptography. In Proceedings of the 11th International Workshop, SAC 2004, Waterloo, ON, Canada, 9-10 August 2004; pp. 227-240
-
(2004)
In Proceedings of the 11Th International Workshop
, pp. 227-240
-
-
Billet, O.1
Gilbert, H.2
Ech-Chatbi, C.3
-
80
-
-
85026978986
-
-
accessed on 7 March 2016
-
Yegin, A.; Shelby, Z. CoAP Security Options. Available online: https://tools.ietf.org/html/draft-yegin-coapsecurity- options-00 (accessed on 7 March 2016).
-
Coap Security Options
-
-
Yegin, A.1
Shelby, Z.2
-
82
-
-
84964640467
-
-
accessed on 7 March 2016)
-
Schaad, J. CBOR Encoded Message Syntax. Available online: https://tools.ietf.org/id/draft-ietfcose- msg-10.txt (accessed on 7 March 2016).
-
CBOR Encoded Message Syntax
-
-
Schaad, J.1
-
85
-
-
85026979494
-
State Machines for Extensible Authentication Protocol (EAP) Peer and Authenticator
-
accessed on 7 March 2016
-
Vollbrecht, J.; Eronen, P.; Petroni, N.; Ohba, Y. State Machines for Extensible Authentication Protocol (EAP) Peer and Authenticator. RFC 4137 (Informational), 2005. Available online: https://tools.ietf.org/html/rfc4137 (accessed on 7 March 2016).
-
(2005)
RFC 4137 (Informational)
-
-
Vollbrecht, J.1
Eronen, P.2
Petroni, N.3
Ohba, Y.4
-
87
-
-
85026980635
-
-
accessed on 7 March 2016
-
Howlett, J.; Hartman, S.; Perez-Mendez, A. A RADIUS Attribute, Binding, Profiles, Name Identifier Format, and Confirmation Methods for SAML. Available online: https://tools.ietf.org/html/draft-ietf-abfab-aaa-saml-13 (accessed on 7 March 2016).
-
A RADIUS Attribute, Binding, Profiles, Name Identifier Format, and Confirmation Methods for SAML
-
-
Howlett, J.1
Hartman, S.2
Perez-Mendez, A.3
-
89
-
-
84978040040
-
Concise Binary Object Representation (CBOR)
-
accessed on 7 March 2016
-
Bormann, C.; Hoffman, P. Concise Binary Object Representation (CBOR). RFC 7049 (Proposed Standard), 2013. Available online: http://tools.ietf.org/html/rfc7049?ref=dzone (accessed on 7 March 2016).
-
(2013)
RFC 7049 (Proposed Standard)
-
-
Bormann, C.1
Hoffman, P.2
-
90
-
-
84977657591
-
-
accessed on 7 March 2016
-
Qanbari, S.; Mahdizadeh, S.; Dustdar, S.; Behinaein, N.; Rahimzadeh, R. Diameter of Things (DoT): A Protocol for Real-Time Telemetry of IoT Applications. Available online: https://tools.ietf.org/html/draft-tuwien-dsg-diameterofthings-01 (accessed on 7 March 2016).
-
Diameter of Things (Dot): A Protocol for Real-Time Telemetry of Iot Applications
-
-
Qanbari, S.1
Mahdizadeh, S.2
Dustdar, S.3
Behinaein, N.4
Rahimzadeh, R.5
-
93
-
-
85026977574
-
Cisco Vendor-Specific RADIUS Attributes for the Delivery of Keying Material
-
accessed on 7 March 2016
-
Zorn, G.; Zhang, T.; Walker, J.; Salowey, J. Cisco Vendor-Specific RADIUS Attributes for the Delivery of Keying Material. RFC 6218 (Informational), 2011. Available online: http://tools.ietf.org/html/rfc6218 (accessed on 7 March 2016).
-
(2011)
RFC 6218 (Informational)
-
-
Zorn, G.1
Zhang, T.2
Walker, J.3
Salowey, J.4
-
94
-
-
84870352101
-
Ubiquitous Computing and Ambient Intelligence
-
UCAmI 2012, Vitoria-Gasteiz, Spain, 3-5 December
-
Naranjo, J.A.M.; Orduña, P.; Gómez-Goiri, A.; López-de Ipiña, D.; Casado, L.G. Ubiquitous Computing and Ambient Intelligence. In Proceedings of the 6th International Conference, UCAmI 2012, Vitoria-Gasteiz, Spain, 3-5 December 2012; ; pp. 33-41
-
(2012)
In Proceedings of the 6Th International Conference
, pp. 33-41
-
-
Naranjo, J.A.M.1
Orduña, P.2
Gómez-Goiri, A.3
López-De Ipiña, D.4
Casado, L.G.5
-
95
-
-
46149087550
-
Cross-Level Sensor Network Simulation with COOJA
-
, Tampa, FL, USA, 14-16 November
-
Österlind, F.; Dunkels, A.; Erikson, J.; Finne, N.; Voigt, T. Cross-Level Sensor Network Simulation with COOJA. In Proceedings of the 2006 31st IEEE Conference on Local Computer Networks, Tampa, FL, USA, 14-16 November 2006
-
(2006)
Proceedings of the 2006 31St IEEE Conference on Local Computer Networks
-
-
Österlind, F.1
Dunkels, A.2
Erikson, J.3
Finne, N.4
Voigt, T.5
-
96
-
-
85026977743
-
-
accessed on 7 March 2016
-
Using Cooja Test Scripts to Automate Simulations. Available online: https://github.com/contiki-os/contiki/wiki/Using-Cooja-Test-Scripts-to-Automate-Simulations 2014. (accessed on 7 March 2016).
-
Using Cooja Test Scripts to Automate Simulations
-
-
-
97
-
-
84899017569
-
An open source implementation of the protocol for carrying authentication for network access: OpenPANA
-
Moreno-Sanchez, P.; Marin-Lopez, R.; Vidal-Meca, F. An open source implementation of the protocol for carrying authentication for network access: OpenPANA. IEEE Netw. 2014, 28, 49-55
-
(2014)
IEEE Netw
, vol.28
, pp. 49-55
-
-
Moreno-Sanchez, P.1
Marin-Lopez, R.2
Vidal-Meca, F.3
-
101
-
-
83355164042
-
A Low-Power CoAP for Contiki
-
Kovatsch, M.; Duquennoy, S.; Dunkels, A. A Low-Power CoAP for Contiki. In Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2011), Valencia, Spain, 17-21 October 2011
-
(2011)
Proceedings of the 8Th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2011), Valencia, Spain, 17-21
-
-
Kovatsch, M.1
Duquennoy, S.2
Dunkels, A.3
-
103
-
-
84255183030
-
A Critical Evaluation of the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL
-
Wuhan, China, 10-12 October
-
Clausen, T.; Herberg, U.; Philipp, M. A Critical Evaluation of the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). In Proceedings of the 2011 IEEE 7th International Conference onWireless and Mobile Computing, Networking and Communications (WiMob), Wuhan, China, 10-12 October 2011; pp. 365-372
-
(2011)
In Proceedings of the 2011 IEEE 7Th International Conference Onwireless and Mobile Computing, Networking and Communications (Wimob
, pp. 365-372
-
-
Clausen, T.1
Herberg, U.2
Philipp, M.3
-
104
-
-
33747001690
-
The Art of Comp Systems Perform Analysis: Techniques for Experimental Design
-
Wiley: Hoboken, NJ, USA
-
Jain, R. The Art of Comp Systems Perform Analysis: Techniques for Experimental Design, Measurement, Simulation and Modelling; Wiley: Hoboken, NJ, USA, 1991
-
(1991)
Measurement, Simulation and Modelling
-
-
Jain, R.1
-
105
-
-
83355168853
-
-
Swedish Institute of Computer Science: Stockholm, Sweden
-
Dunkels, A.; Eriksson, J.; Finne, N.; Tsiftes, N. Powertrace: Network-Level Power Profiling for Low-Power Wireless networks. Technical Report T2011:05, Swedish Institute of Computer Science: Stockholm, Sweden, 2011
-
(2011)
Powertrace: Network-Level Power Profiling for Low-Power Wireless Networks. Technical Report T2011:05
-
-
Dunkels, A.1
Eriksson, J.2
Finne, N.3
Tsiftes, N.4
|