-
1
-
-
77953085540
-
Wireless home automation networks: A survey of architectures and technologies
-
Jun.
-
C. Gomez and J. Paradells, "Wireless home automation networks: A survey of architectures and technologies," IEEE Commun. Mag., vol. 48, no. 6, pp. 92-101, Jun. 2010.
-
(2010)
IEEE Commun. Mag.
, vol.48
, Issue.6
, pp. 92-101
-
-
Gomez, C.1
Paradells, J.2
-
2
-
-
84866785000
-
Seamless integration of heterogeneous devices and access control in smart homes
-
Jun.
-
J. E. Kim, G. Boulos, J. Yackovich, T. Barth, C. Beckel, and D. Mosse, "Seamless integration of heterogeneous devices and access control in smart homes," in Proc. 8th Int. Conf. Intell. Environ. (IE), Jun. 2012, pp. 206-213.
-
(2012)
Proc. 8th Int. Conf. Intell. Environ. (IE)
, pp. 206-213
-
-
Kim, J.E.1
Boulos, G.2
Yackovich, J.3
Barth, T.4
Beckel, C.5
Mosse, D.6
-
3
-
-
84961901149
-
Security in smart home environment
-
Hershey, PA, USA: IGI Global
-
G. Mantas, D. Lymberopoulos, and N. Komninos, "Security in smart home environment," in Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications. Hershey, PA, USA: IGI Global, 2006.
-
(2006)
Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications
-
-
Mantas, G.1
Lymberopoulos, D.2
Komninos, N.3
-
5
-
-
84887020581
-
Forecasting the behavior of an elderly using wireless sensors data in a smart home
-
Nov.
-
N. K. Suryadevara, S. C. Mukhopadhyay, R. Wang, and R. K. Rayudu, "Forecasting the behavior of an elderly using wireless sensors data in a smart home," Eng. Appl. Artif. Intell., vol. 26, no. 10, pp. 2641-2652, Nov. 2013.
-
(2013)
Eng. Appl. Artif. Intell.
, vol.26
, Issue.10
, pp. 2641-2652
-
-
Suryadevara, N.K.1
Mukhopadhyay, S.C.2
Wang, R.3
Rayudu, R.K.4
-
6
-
-
84961912480
-
-
[Online]. accessed Jul. 15
-
HOPE-Smart Home For Elderly People. [Online]. Available: http://www.hope-project.eu/, accessed Jul. 15, 2015.
-
(2015)
HOPE-Smart Home for Elderly People
-
-
-
7
-
-
84961912488
-
-
[Online]. accessed Jul. 16
-
SM4ALL-Smart Homes for All. [Online]. Available: http://www.sm4allproject.eu/, accessed Jul. 16, 2015.
-
(2015)
SM4ALL-Smart Homes for All
-
-
-
8
-
-
84961926739
-
-
[Online]. accessed Jul. 15
-
GENIO-Next Generation Home. [Online]. Available: http://projects.celtic-initiative.org/genio/, accessed Jul. 15, 2015.
-
(2015)
GENIO-Next Generation Home
-
-
-
9
-
-
84863738127
-
Resource and service management architecture of a low capacity network for smart spaces
-
May
-
S. Bhardwaj, T. Ozcelebi, J. Lukkien, and C. Uysal, "Resource and service management architecture of a low capacity network for smart spaces," IEEE Trans. Consum. Electron., vol. 58, no. 2, pp. 389-396, May 2012.
-
(2012)
IEEE Trans. Consum. Electron.
, vol.58
, Issue.2
, pp. 389-396
-
-
Bhardwaj, S.1
Ozcelebi, T.2
Lukkien, J.3
Uysal, C.4
-
10
-
-
85006386525
-
-
Internet Engineering Task Force, Fremont, CA, USA, Tech. Rep., Jul.
-
H. Tschofenig, J. Arkko, and D. McPherson, "Architectural considerations in smart object networking," Internet Engineering Task Force, Fremont, CA, USA, Tech. Rep. RFC-7452, Jul. 2014.
-
(2014)
Architectural Considerations in Smart Object Networking
-
-
Tschofenig, H.1
Arkko, J.2
McPherson, D.3
-
11
-
-
84885711173
-
-
(Lecture Notes in Computer Science). New York, NY, USA: Springer
-
D. G. Korzun, S. I. Balandin, and A. V. Gurtov, Deployment of Smart Spaces in Internet of Things: Overview of the Design Challenges (Lecture Notes in Computer Science), vol. 8121. New York, NY, USA: Springer, 2013.
-
(2013)
Deployment of Smart Spaces in Internet of Things: Overview of the Design Challenges
, vol.8121
-
-
Korzun, D.G.1
Balandin, S.I.2
Gurtov, A.V.3
-
14
-
-
84883438554
-
Design of a key establishment protocol for smart home energy management system
-
Jun.
-
Y. Li, "Design of a key establishment protocol for smart home energy management system," in Proc. 5th Int. Conf. Comput. Intell., Commun. Syst. Netw. (CICSyN), Jun. 2013, pp. 88-93.
-
(2013)
Proc. 5th Int. Conf. Comput. Intell., Commun. Syst. Netw. (CICSyN)
, pp. 88-93
-
-
Li, Y.1
-
15
-
-
79952934001
-
Device authentication mechanism for smart energy home area networks
-
Jan.
-
B. Vaidya, D. Makrakis, and H. T. Mouftah, "Device authentication mechanism for smart energy home area networks," in Proc. IEEE Int. Conf. Consum. Electron. (ICCE), Jan. 2011, pp. 787-788.
-
(2011)
Proc. IEEE Int. Conf. Consum. Electron. (ICCE)
, pp. 787-788
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.T.3
-
16
-
-
84883453070
-
A novel secure key paring protocol for RF4CE ubiquitous smart home systems
-
Jun.
-
K. Han, J. Kim, T. Shon, and D. Ko, "A novel secure key paring protocol for RF4CE ubiquitous smart home systems," Pers. Ubiquitous Comput., vol. 17, no. 5, pp. 945-949, Jun. 2013.
-
(2013)
Pers. Ubiquitous Comput.
, vol.17
, Issue.5
, pp. 945-949
-
-
Han, K.1
Kim, J.2
Shon, T.3
Ko, D.4
-
17
-
-
84896953511
-
Correct by construction security approach to design fault tolerant smart homes for disabled people
-
S. Guillet, B. Bouchard, and A. Bouzouane, "Correct by construction security approach to design fault tolerant smart homes for disabled people," Proc. Comput. Sci., vol. 21, pp. 257-264, 2013.
-
(2013)
Proc. Comput. Sci.
, vol.21
, pp. 257-264
-
-
Guillet, S.1
Bouchard, B.2
Bouzouane, A.3
-
18
-
-
84906788294
-
Privacy-preserving data infrastructure for smart home appliances based on the octopus DHT
-
Oct.
-
B. Fabian and T. Feldhaus, "Privacy-preserving data infrastructure for smart home appliances based on the octopus DHT," Comput. Ind., vol. 65, no. 8, pp. 1147-1160, Oct. 2014.
-
(2014)
Comput. Ind.
, vol.65
, Issue.8
, pp. 1147-1160
-
-
Fabian, B.1
Feldhaus, T.2
-
20
-
-
84961901183
-
Hackers expose how connected toilets, heaters and light bulbs are at risk
-
Jul.
-
D. Yadron, "Hackers expose how connected toilets, heaters and light bulbs are at risk," Wall Street J., Jul. 2013.
-
(2013)
Wall Street J.
-
-
Yadron, D.1
-
21
-
-
79955594692
-
SAKE: Software attestation for key establishment in sensor networks
-
Aug.
-
A. Seshadri, M. Luk, and A. Perrig, "SAKE: Software attestation for key establishment in sensor networks," Ad Hoc Netw., vol. 9, no. 6, pp. 1059-1067, Aug. 2011.
-
(2011)
Ad Hoc Netw.
, vol.9
, Issue.6
, pp. 1059-1067
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
-
22
-
-
84864248763
-
Security and privacy considerations for wireless sensor networks in smart home environments
-
May
-
K. Islam, W. Shen, and X. Wang, "Security and privacy considerations for wireless sensor networks in smart home environments," in Proc. IEEE 16th Int. Conf. Comput. Supported Cooperat. Work Design (CSCWD), May 2012, pp. 626-633.
-
(2012)
Proc. IEEE 16th Int. Conf. Comput. Supported Cooperat. Work Design (CSCWD)
, pp. 626-633
-
-
Islam, K.1
Shen, W.2
Wang, X.3
-
23
-
-
33646227667
-
Automated security protocol analysis with the AVISPA tool
-
May
-
L. Viganò, "Automated security protocol analysis with the AVISPA tool," Electron. Notes Theoretical Comput. Sci., vol. 155, pp. 61-86, May 2006.
-
(2006)
Electron. Notes Theoretical Comput. Sci.
, vol.155
, pp. 61-86
-
-
Viganò, L.1
-
25
-
-
84961866806
-
-
Ecole Polytechnique Federale De Lausanne, Lausanne, Switzerland, Tech. Rep.
-
E. Ayday and S. Rajagopal, "Secure device authentication mechanisms for the smart grid-enabled home area networks," Ecole Polytechnique Federale De Lausanne, Lausanne, Switzerland, Tech. Rep. EPLFREPORT- 188373, 2013, pp. 1-18.
-
(2013)
Secure Device Authentication Mechanisms for the Smart Grid-enabled Home Area Networks
, pp. 1-18
-
-
Ayday, E.1
Rajagopal, S.2
-
26
-
-
0036691221
-
Home networking with IEEE 802.15.4: A developing standard for low-rate wireless personal area networks
-
Aug.
-
E. Callaway et al., "Home networking with IEEE 802.15.4: A developing standard for low-rate wireless personal area networks," IEEE Commun. Mag., vol. 40, no. 8, pp. 70-77, Aug. 2002.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.8
, pp. 70-77
-
-
Callaway, E.1
-
27
-
-
78651451700
-
Design and implementation of a wireless sensor network for smart homes
-
Oct.
-
M. Xu, L. Ma, F. Xia, T. Yuan, J. Qian, and M. Shao, "Design and implementation of a wireless sensor network for smart homes," in Proc. 7th Int. Conf. Ubiquitous Intell. Comput. 7th Int. Conf. Auto. Trusted Comput. (UIC/ATC), Oct. 2010, pp. 239-243.
-
(2010)
Proc. 7th Int. Conf. Ubiquitous Intell. Comput. 7th Int. Conf. Auto. Trusted Comput. (UIC/ATC)
, pp. 239-243
-
-
Xu, M.1
Ma, L.2
Xia, F.3
Yuan, T.4
Qian, J.5
Shao, M.6
-
28
-
-
58149175440
-
Design and implementation of wireless smart-home sensor network based on ZigBee protocol
-
May
-
L. Liang, L. Huang, X. Jiang, and Y. Yao, "Design and implementation of wireless smart-home sensor network based on ZigBee protocol," in Proc. Int. Conf. Commun., Circuits Syst. (ICCCAS), May 2008, pp. 434-438.
-
(2008)
Proc. Int. Conf. Commun., Circuits Syst. (ICCCAS)
, pp. 434-438
-
-
Liang, L.1
Huang, L.2
Jiang, X.3
Yao, Y.4
-
29
-
-
84961950849
-
-
Internet Engineering Task Force, Fremont, CA, USA, Tech. Rep., Apr.
-
H. Tschofenig and J. Arkko, "Report from the smart object workshop," Internet Engineering Task Force, Fremont, CA, USA, Tech. Rep., Apr. 2012.
-
(2012)
Report from the Smart Object Workshop
-
-
Tschofenig, H.1
Arkko, J.2
-
30
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, "SPINS: Security protocols for sensor networks," in Proc. Wireless Netw., 2001, pp. 189-199.
-
(2001)
Proc. Wireless Netw.
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
31
-
-
84875240623
-
A lightweight framework for secure life-logging in smart environments
-
Feb.
-
N. E. Petroulakis, E. Z. Tragos, A. G. Fragkiadakis, and G. Spanoudakis, "A lightweight framework for secure life-logging in smart environments," Inf. Secur. Tech. Rep., vol. 17, no. 3, pp. 58-70, Feb. 2013.
-
(2013)
Inf. Secur. Tech. Rep.
, vol.17
, Issue.3
, pp. 58-70
-
-
Petroulakis, N.E.1
Tragos, E.Z.2
Fragkiadakis, A.G.3
Spanoudakis, G.4
-
32
-
-
84877743568
-
A time synchronization mechanism for heterogeneous wireless sensor networks
-
Mar.
-
Y. Li, Y. Huang, and H. Sun, "A time synchronization mechanism for heterogeneous wireless sensor networks," in Proc. Int. Conf. Autom. Control Artif. Intell. (ACAI), Mar. 2012, pp. 317-320.
-
(2012)
Proc. Int. Conf. Autom. Control Artif. Intell. (ACAI)
, pp. 317-320
-
-
Li, Y.1
Huang, Y.2
Sun, H.3
-
33
-
-
84898682098
-
An efficient and simple key distribution scheme for smart environments
-
Jan.
-
P. Kumar, M. Ylianttila, A. Gurtov, and M. Sain, "An efficient and simple key distribution scheme for smart environments," in Proc. IEEE Int. Conf. Consum. Electron. (ICCE), Jan. 2014, pp. 468-469.
-
(2014)
Proc. IEEE Int. Conf. Consum. Electron. (ICCE)
, pp. 468-469
-
-
Kumar, P.1
Ylianttila, M.2
Gurtov, A.3
Sain, M.4
-
34
-
-
79952059658
-
Lightweight and provably secure user authentication with anonymity for the global mobility network
-
Mar.
-
C. Chen, D. He, S. Chan, J. Bu, Y. Gao, and R. Fan, "Lightweight and provably secure user authentication with anonymity for the global mobility network," Int. J. Commun. Syst., vol. 24, no. 3, pp. 347-362, Mar. 2011.
-
(2011)
Int. J. Commun. Syst.
, vol.24
, Issue.3
, pp. 347-362
-
-
Chen, C.1
He, D.2
Chan, S.3
Bu, J.4
Gao, Y.5
Fan, R.6
-
35
-
-
84902282428
-
Efficient authentication and key management mechanisms for smart grid communications
-
Jun.
-
H. Nicanfar, P. Jokar, K. Beznosov, and V. C. M. Leung, "Efficient authentication and key management mechanisms for smart grid communications," IEEE Syst. J., vol. 8, no. 2, pp. 629-640, Jun. 2014.
-
(2014)
IEEE Syst. J.
, vol.8
, Issue.2
, pp. 629-640
-
-
Nicanfar, H.1
Jokar, P.2
Beznosov, K.3
Leung, V.C.M.4
-
37
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Mar.
-
M. L. Das, "Two-factor user authentication in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1086-1090, Mar. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
38
-
-
33750111807
-
An improved key distribution mechanism for large-scale hierarchical wireless sensor networks
-
Jan.
-
Y. Cheng and D. P. Agrawal, "An improved key distribution mechanism for large-scale hierarchical wireless sensor networks," Ad Hoc Netw., vol. 5, no. 1, pp. 35-48, Jan. 2007.
-
(2007)
Ad Hoc Netw.
, vol.5
, Issue.1
, pp. 35-48
-
-
Cheng, Y.1
Agrawal, D.P.2
-
39
-
-
79955281664
-
AIS for misbehavior detection in wireless sensor networks: Performance and design principles
-
Sep.
-
M. Drozda, S. Schaust, and H. Szczerbicka, "AIS for misbehavior detection in wireless sensor networks: Performance and design principles," in Proc. IEEE Congr. Evol. Comput. (CEC), Sep. 2007, pp. 3719-3726.
-
(2007)
Proc. IEEE Congr. Evol. Comput. (CEC)
, pp. 3719-3726
-
-
Drozda, M.1
Schaust, S.2
Szczerbicka, H.3
-
40
-
-
84923588929
-
-
Cambridge, U.K.: Cambridge Univ. Press, Mar.
-
P. Levis, TinyOS Programming. Cambridge, U.K.: Cambridge Univ. Press, Mar. 2009.
-
(2009)
TinyOS Programming
-
-
Levis, P.1
-
41
-
-
78049298573
-
The price of security in wireless sensor networks
-
Dec.
-
J. Lee, K. Kapitanova, and S. H. Son, "The price of security in wireless sensor networks," Comput. Netw., vol. 54, no. 17, pp. 2967-2978, Dec. 2010.
-
(2010)
Comput. Netw.
, vol.54
, Issue.17
, pp. 2967-2978
-
-
Lee, J.1
Kapitanova, K.2
Son, S.H.3
-
42
-
-
83055177191
-
Performance analysis of HIP diet exchange for WSN security establishment
-
P. Nie, J. Vähä-Herttua, T. Aura, and A. Gurtov, "Performance analysis of HIP diet exchange for WSN security establishment," in Proc. 7th ACM Symp. QoS Secur. Wireless Mobile Netw. (Q2SWinet), 2011, pp. 51-56.
-
(2011)
Proc. 7th ACM Symp. QoS Secur. Wireless Mobile Netw. (Q2SWinet)
, pp. 51-56
-
-
Nie, P.1
Vähä-Herttua, J.2
Aura, T.3
Gurtov, A.4
-
44
-
-
1442357062
-
-
Internet Engineering Task Force, Fremont, CA, USA, Tech. Rep., Sep.
-
D. Eastlake and P. Jones, "US secure hash alrorithm," Internet Engineering Task Force, Fremont, CA, USA, Tech. Rep. RFC 3174, Sep. 2001.
-
(2001)
US Secure Hash Alrorithm
-
-
Eastlake, D.1
Jones, P.2
-
45
-
-
35348897342
-
MiniSec: A secure sensor network communication architecture
-
Apr.
-
M. Luk, G. Mezzour, A. Perrig, and V. Gligor, "MiniSec: A secure sensor network communication architecture," in Proc. 6th Int. Symp. Inf. Process. Sensor Netw. (IPSN), Apr. 2007, pp. 479-488.
-
(2007)
Proc. 6th Int. Symp. Inf. Process. Sensor Netw. (IPSN)
, pp. 479-488
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
46
-
-
84884905327
-
Secure data discovery and dissemination based on hash tree for wireless sensor networks
-
Sep.
-
D. He, S. Chan, S. Tang, and M. Guizani, "Secure data discovery and dissemination based on hash tree for wireless sensor networks," IEEE Trans. Wireless Commun., vol. 12, no. 9, pp. 4638-4646, Sep. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.9
, pp. 4638-4646
-
-
He, D.1
Chan, S.2
Tang, S.3
Guizani, M.4
-
47
-
-
84961866802
-
Low-cost standard signatures in wireless sensor networks: A case for reviving pre-computation techniques?
-
San Diego, CA, USA, Feb.
-
G. Ateniese, G. Bianchi, A. Capossele, and C. Petrioli, "Low-cost standard signatures in wireless sensor networks: A case for reviving pre-computation techniques?" in Proc. NDSS, San Diego, CA, USA, Feb. 2013.
-
(2013)
Proc. NDSS
-
-
Ateniese, G.1
Bianchi, G.2
Capossele, A.3
Petrioli, C.4
-
48
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
Oct.
-
G. de Meulenaer, F. Gosset, O.-X. Standaert, and O. Pereira, "On the energy cost of communication and cryptography in wireless sensor networks," in Proc. IEEE Int. Conf. Wireless Mobile Comput. Netw. Commun. (WIMOB), Oct. 2008, pp. 580-585.
-
(2008)
Proc. IEEE Int. Conf. Wireless Mobile Comput. Netw. Commun. (WIMOB)
, pp. 580-585
-
-
De Meulenaer, G.1
Gosset, F.2
Standaert, O.-X.3
Pereira, O.4
|