-
1
-
-
51249107460
-
-
Tech. Rep.
-
N. Kushalnagar, G. Montenegro, and C. Schumacher, "IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals, RFC 4919," Tech. Rep., 2007.
-
(2007)
IPv6 over Low-power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals, RFC 4919
-
-
Kushalnagar, N.1
Montenegro, G.2
Schumacher, C.3
-
2
-
-
33746690237
-
-
Tech. Rep., Sep.
-
G. Deloche, N. Kushalnagar, J. Hui, and D. Culler, "Transmission of IPv6 packets over IEEE 802.15.4 networks, RFC 4944," Tech. Rep., Sep. 2007.
-
(2007)
Transmission of IPv6 Packets over IEEE 802.15.4 Networks, RFC 4944
-
-
Deloche, G.1
Kushalnagar, N.2
Hui, J.3
Culler, D.4
-
4
-
-
84908397157
-
Internet of Things for smart cities
-
Feb.
-
A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, "Internet of Things for smart cities," IEEE Internet Things J., vol. 1, no. 1, pp. 22-32, Feb. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.1
, pp. 22-32
-
-
Zanella, A.1
Bui, N.2
Castellani, A.3
Vangelista, L.4
Zorzi, M.5
-
5
-
-
70449633122
-
Security analysis survey and framework design for IP connected LoWPANs
-
Mar.
-
R. Riaz, K.-H. Kim, and H. F. Ahmed, "Security analysis survey and framework design for IP connected LoWPANs," in Proc. Int. Symp. Auto. Decentralized Syst., Mar. 2009, pp. 1-6.
-
(2009)
Proc. Int. Symp. Auto. Decentralized Syst.
, pp. 1-6
-
-
Riaz, R.1
Kim, K.-H.2
Ahmed, H.F.3
-
6
-
-
47649094244
-
Extending IP to low-power, wireless personal area networks
-
Jul./Aug.
-
J. W. Hui and D. E. Culler, "Extending IP to low-power, wireless personal area networks," IEEE Internet Comput., vol. 12, no. 4, pp. 37-45, Jul./Aug. 2008.
-
(2008)
IEEE Internet Comput.
, vol.12
, Issue.4
, pp. 37-45
-
-
Hui, J.W.1
Culler, D.E.2
-
7
-
-
79953774779
-
Connecting low-power and lossy networks to the Internet
-
Apr.
-
J. Ko, A. Terzis, S. Dawson-Haggerty, D. E. Culler, J. W. Hui, and P. Levis, "Connecting low-power and lossy networks to the Internet," IEEE Commun. Mag., vol. 49, no. 4, pp. 96-101, Apr. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.4
, pp. 96-101
-
-
Ko, J.1
Terzis, A.2
Dawson-Haggerty, S.3
Culler, D.E.4
Hui, J.W.5
Levis, P.6
-
8
-
-
77958150762
-
IPv6 in low-power wireless networks
-
Nov.
-
J. W. Hui and D. E. Culler, "IPv6 in low-power wireless networks," Proc. IEEE, vol. 98, no. 11, pp. 1865-1878, Nov. 2010.
-
(2010)
Proc. IEEE
, vol.98
, Issue.11
, pp. 1865-1878
-
-
Hui, J.W.1
Culler, D.E.2
-
9
-
-
34247606829
-
Efficient hybrid security mechanisms for heterogeneous sensor networks
-
Jun.
-
P. Traynor, R. Kumar, H. Choi, G. Cao, S. Zhu, and T. La Porta, "Efficient hybrid security mechanisms for heterogeneous sensor networks," IEEE Trans. Mobile Comput., vol. 6, no. 6, pp. 663-677, Jun. 2007.
-
(2007)
IEEE Trans. Mobile Comput.
, vol.6
, Issue.6
, pp. 663-677
-
-
Traynor, P.1
Kumar, R.2
Choi, H.3
Cao, G.4
Zhu, S.5
La Porta, T.6
-
10
-
-
32844459414
-
A key management scheme for wireless sensor networks using deployment knowledge
-
Jan.
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge," IEEE Trans. Dependable Secure Comput., vol. 3, no. 1, pp. 62-77, Jan. 2006.
-
(2006)
IEEE Trans. Dependable Secure Comput.
, vol.3
, Issue.1
, pp. 62-77
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
11
-
-
84961108579
-
Key management in IP-based ubiquitous sensor networks: Issues, challenges and solutions
-
Dubai, UAE, Feb.
-
A. H. Akbar, R. Riaz, S. Biswas, K. I. Kim, S. W. Yoo, B. H Roh, "Key management in IP-based ubiquitous sensor networks: Issues, challenges and solutions," in Proc. 1st Int. Conf. Ubiquitous Inf. Technol., Dubai, UAE, Feb. 2007.
-
(2007)
Proc. 1st Int. Conf. Ubiquitous Inf. Technol.
-
-
Akbar, A.H.1
Riaz, R.2
Biswas, S.3
Kim, K.I.4
Yoo, S.W.5
Roh, B.H.6
-
12
-
-
77954886398
-
Geographic server distribution model for key revocation
-
Aug.
-
S. Misra, S. Goswami, G. P. Pathak, N. Shah, and I. Woungang, "Geographic server distribution model for key revocation," Telecommun. Syst., vol. 44, nos. 3-4, pp. 281-295, Aug. 2010.
-
(2010)
Telecommun. Syst.
, vol.44
, Issue.3-4
, pp. 281-295
-
-
Misra, S.1
Goswami, S.2
Pathak, G.P.3
Shah, N.4
Woungang, I.5
-
15
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Oakland, CA, USA, May
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE Symp. Secur. Privacy, Oakland, CA, USA, May 2003, pp. 197-213.
-
(2003)
Proc. IEEE Symp. Secur. Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
16
-
-
78751641700
-
Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks
-
Feb.
-
S. Misra, S. Goswami, G. P. Pathak, and N. Shah, "Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks," Wireless Commun. Mobile Comput., vol. 11, no. 2, pp. 146-162, Feb. 2011.
-
(2011)
Wireless Commun. Mobile Comput.
, vol.11
, Issue.2
, pp. 146-162
-
-
Misra, S.1
Goswami, S.2
Pathak, G.P.3
Shah, N.4
-
17
-
-
84896469488
-
Certification authorities under attack: A plea for certificate legitimation
-
Jan./Feb.
-
R. Oppliger, "Certification authorities under attack: A plea for certificate legitimation," IEEE Internet Comput., vol. 18, no. 1, pp. 40-47, Jan./Feb. 2014.
-
(2014)
IEEE Internet Comput.
, vol.18
, Issue.1
, pp. 40-47
-
-
Oppliger, R.1
-
18
-
-
84891569276
-
-
New York, NY, USA: Wiley
-
D. Boswarthick, O. Elloumi, and O. Hersent, Eds., M2M Communications: A Systems Approach. New York, NY, USA: Wiley, 2012.
-
(2012)
M2M Communications: A Systems Approach
-
-
Boswarthick, D.1
Elloumi, O.2
Hersent, O.3
-
19
-
-
84891583935
-
-
New York, NY, USA: Wiley
-
O. Hersent, D. Boswarthick, and O. Elloumi, The Internet of Things: Key Applications and Protocols. New York, NY, USA: Wiley, 2012.
-
(2012)
The Internet of Things: Key Applications and Protocols
-
-
Hersent, O.1
Boswarthick, D.2
Elloumi, O.3
-
21
-
-
12444337118
-
-
2nd ed. Reading, MA, USA: Addison-Wesley
-
C. Adams and S. Lloyd, Understanding PKI: Concepts, Standards, and Deployment Considerations, 2nd ed. Reading, MA, USA: Addison-Wesley, 2002.
-
(2002)
Understanding PKI: Concepts, Standards, and Deployment Considerations
-
-
Adams, C.1
Lloyd, S.2
-
24
-
-
84959275167
-
Optimization of public key cryptography (RSA and ECC) for 16-bits devices based on 6LoWPAN
-
Tokyo, Japan
-
J. Ayuso, L. Marin, A. J. Jara, and A. F. G. Skarmeta, "Optimization of public key cryptography (RSA and ECC) for 16-bits devices based on 6LoWPAN," in Proc. 1st Int. Workshop Secur. Internet Things, Tokyo, Japan, 2010, pp. 1-8.
-
(2010)
Proc. 1st Int. Workshop Secur. Internet Things
, pp. 1-8
-
-
Ayuso, J.1
Marin, L.2
Jara, A.J.3
Skarmeta, A.F.G.4
-
25
-
-
84893874337
-
An enhanced public key infrastructure to secure smart grid wireless communication networks
-
Jan./Feb.
-
D. He, S. Chan, Y. Zhang, M. Guizani, C. Chen, and J. Bu, "An enhanced public key infrastructure to secure smart grid wireless communication networks," IEEE Netw., vol. 28, no. 1, pp. 10-16, Jan./Feb. 2014.
-
(2014)
IEEE Netw.
, vol.28
, Issue.1
, pp. 10-16
-
-
He, D.1
Chan, S.2
Zhang, Y.3
Guizani, M.4
Chen, C.5
Bu, J.6
-
26
-
-
84880570801
-
Efficient signcryption for heterogeneous systems
-
Sep.
-
F. Li, H. Zhang, and T. Takagi, "Efficient signcryption for heterogeneous systems," IEEE Syst. J., vol. 7, no. 3, pp. 420-429, Sep. 2013.
-
(2013)
IEEE Syst. J.
, vol.7
, Issue.3
, pp. 420-429
-
-
Li, F.1
Zhang, H.2
Takagi, T.3
-
27
-
-
56949106654
-
A unified security framework with three key management schemes for wireless sensor networks
-
Dec.
-
R. Riaz, A. Naureen, A. Akram, A. H. Akbar, K.-H. Kim, and H. F. Ahmed, "A unified security framework with three key management schemes for wireless sensor networks," Comput. Commun., vol. 31, no. 18, pp. 4269-4280, Dec. 2008.
-
(2008)
Comput. Commun.
, vol.31
, Issue.18
, pp. 4269-4280
-
-
Riaz, R.1
Naureen, A.2
Akram, A.3
Akbar, A.H.4
Kim, K.-H.5
Ahmed, H.F.6
-
28
-
-
84892410398
-
Privacy-preserving authenticated key-exchange over Internet
-
Jan.
-
A. C.-C. Yao and Y. Zhao, "Privacy-preserving authenticated key-exchange over Internet," IEEE Trans. Inf. Forensics Security, vol. 9, no. 1, pp. 125-140, Jan. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.1
, pp. 125-140
-
-
Yao, A.C.-C.1
Zhao, Y.2
-
30
-
-
84870429369
-
EMAP: Expedite message authentication protocol for vehicular ad hoc networks
-
Jan.
-
A. Wasef and X. Shen, "EMAP: Expedite message authentication protocol for vehicular ad hoc networks," IEEE Trans. Mobile Comput., vol. 12, no. 1, pp. 78-89, Jan. 2013.
-
(2013)
IEEE Trans. Mobile Comput.
, vol.12
, Issue.1
, pp. 78-89
-
-
Wasef, A.1
Shen, X.2
-
31
-
-
80052500073
-
Securing communication in 6LoWPAN with compressed IPsec
-
Jun.
-
S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt, and U. Roedig, "Securing communication in 6LoWPAN with compressed IPsec," in Proc. Int. Conf. Distrib. Comput. Sensor Syst. Workshops (DCOSS), Jun. 2011, pp. 1-8.
-
(2011)
Proc. Int. Conf. Distrib. Comput. Sensor Syst. Workshops (DCOSS)
, pp. 1-8
-
-
Raza, S.1
Duquennoy, S.2
Chung, T.3
Yazar, D.4
Voigt, T.5
Roedig, U.6
-
32
-
-
84875051385
-
A highly scalable key pre-distribution scheme for wireless sensor networks
-
Feb.
-
W. Bechkit, Y. Challal, A. Bouabdallah, and V. Tarokh, "A highly scalable key pre-distribution scheme for wireless sensor networks," IEEE Trans. Wireless Commun., vol. 12, no. 2, pp. 948-959, Feb. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.2
, pp. 948-959
-
-
Bechkit, W.1
Challal, Y.2
Bouabdallah, A.3
Tarokh, V.4
-
33
-
-
77952925515
-
Key predistribution approach in wireless sensor networks using LU matrix
-
Aug.
-
H. Dai and H. Xu, "Key predistribution approach in wireless sensor networks using LU matrix," IEEE Sensors J., vol. 10, no. 8, pp. 1399-1409, Aug. 2010.
-
(2010)
IEEE Sensors J.
, vol.10
, Issue.8
, pp. 1399-1409
-
-
Dai, H.1
Xu, H.2
-
34
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC, USA
-
L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proc. 9th ACM Conf. Comput. Commun. Secur., Washington, DC, USA, 2012, pp. 41-47.
-
(2012)
Proc. 9th ACM Conf. Comput. Commun. Secur.
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
35
-
-
84903767555
-
A novel approach to trust management in unattended wireless sensor networks
-
Jul.
-
Y. Ren, V. I. Zadorozhny, V. A. Oleshchuk, and F. Y. Li, "A novel approach to trust management in unattended wireless sensor networks," IEEE Trans. Mobile Comput., vol. 13, no. 7, pp. 1409-1423, Jul. 2014.
-
(2014)
IEEE Trans. Mobile Comput.
, vol.13
, Issue.7
, pp. 1409-1423
-
-
Ren, Y.1
Zadorozhny, V.I.2
Oleshchuk, V.A.3
Li, F.Y.4
-
36
-
-
77953552937
-
Cooperative communications based on trust model for mobile ad hoc networks
-
Jun.
-
K. Wang and M. Wu, "Cooperative communications based on trust model for mobile ad hoc networks," IET Inf. Secur., vol. 4, no. 2, pp. 68-79, Jun. 2010.
-
(2010)
IET Inf. Secur.
, vol.4
, Issue.2
, pp. 68-79
-
-
Wang, K.1
Wu, M.2
-
37
-
-
84961085699
-
Securing intracommunication in 6LoWPAN: A PKI integrated scheme
-
Dec.
-
S. Goswami, S. Misra, C. Taneja, and A. Mukherjee, "Securing intracommunication in 6LoWPAN: A PKI integrated scheme," in Proc. IEEE Int. Conf. Adv. Netw. Telecommun. Syst. (ANTS), Dec. 2014, pp. 1-5.
-
(2014)
Proc. IEEE Int. Conf. Adv. Netw. Telecommun. Syst. (ANTS)
, pp. 1-5
-
-
Goswami, S.1
Misra, S.2
Taneja, C.3
Mukherjee, A.4
|