-
1
-
-
84876943063
-
Internet of Things (IoT): A vision, architectural elements, and future directions
-
[CrossRef]
-
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645-1660. [CrossRef]
-
(2013)
Future Gener. Comput. Syst
, vol.29
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
2
-
-
81355138526
-
The internet of things
-
Jun, Z., Simplot-Ryl, D., Bisdikian, C., Mouftah, H.T. The internet of things. IEEE Commun. Mag. 2011, 49, 30-31.
-
(2011)
IEEE Commun. Mag
, vol.49
, pp. 30-31
-
-
Jun, Z.1
Simplot-Ryl, D.2
Bisdikian, C.3
Mouftah, H.T.4
-
3
-
-
84863579460
-
IoT technology and application
-
Qian, Z., Wang, Y. IoT technology and application. Acta Electron. Sin. 2012, 40, 1023-1028.
-
(2012)
Acta Electron. Sin
, vol.40
, pp. 1023-1028
-
-
Qian, Z.1
Wang, Y.2
-
4
-
-
84883040938
-
A secure network for mobile wireless service
-
[CrossRef]
-
Peng, K. A secure network for mobile wireless service. J. Inf. Process. Syst. 2013, 9, 247-258. [CrossRef]
-
(2013)
J. Inf. Process. Syst
, vol.9
, pp. 247-258
-
-
Peng, K.1
-
6
-
-
84962198336
-
A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
-
[CrossRef]
-
Chang, C.C., Le, H.D. A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wirel. Commun. 2016, 15, 357-366. [CrossRef]
-
(2016)
IEEE Trans. Wirel. Commun
, vol.15
, pp. 357-366
-
-
Chang, C.C.1
Le, H.D.2
-
7
-
-
84924940631
-
A survey on communication technologies and requirements for internet of electric vehicles
-
[CrossRef]
-
Bayram, I.S., Papapanagiotou, I. A survey on communication technologies and requirements for internet of electric vehicles. EURASIP J. Wirel. Commun. Netw. 2014, 2014, 223. [CrossRef]
-
(2014)
EURASIP J. Wirel. Commun. Netw.
, vol.2014
, pp. 223
-
-
Bayram, I.S.1
Papapanagiotou, I.2
-
8
-
-
84949667967
-
Energy-efficient node scheduling algorithms for wireless sensor networks using Markov Random Field model
-
[CrossRef]
-
Cheng, H., Su, Z., Xiong, N., Xiao, Y. Energy-efficient node scheduling algorithms for wireless sensor networks using Markov Random Field model. Inf. Sci. 2016, 329, 461-477. [CrossRef]
-
(2016)
Inf. Sci
, vol.329
, pp. 461-477
-
-
Cheng, H.1
Su, Z.2
Xiong, N.3
Xiao, Y.4
-
9
-
-
80051915159
-
Internet of Things: Key technology, architecture and challenging problems
-
Shanghai, China, 10-12 June
-
Zhang, H., Zhu, L. Internet of Things: Key technology, architecture and challenging problems. In Proceedings of the 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE), Shanghai, China, 10-12 June 2011, Volume 4, pp. 507-512.
-
(2011)
Proceedings of the 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE)
, vol.4
, pp. 507-512
-
-
Zhang, H.1
Zhu, L.2
-
10
-
-
85004065829
-
Trends of converging smart devices with IoT technology
-
Ko, J., Hong, S., Lee, B.B., Kim, N.S. Trends of converging smart devices with IoT technology. Electron. Telecommun. Trends 2013, 28, 79-85.
-
(2013)
Electron. Telecommun. Trends
, vol.28
, pp. 79-85
-
-
Ko, J.1
Hong, S.2
Lee, B.B.3
Kim, N.S.4
-
11
-
-
85051578985
-
IETF standardization in the field of the internet of things (IoT): A survey
-
[CrossRef]
-
Ishaq, I., Carels, D., Teklemariam, G.K., Hoebeke, J., Abeele, F.V.D., Poorter, E.D., Demeester, P. IETF standardization in the field of the internet of things (IoT): A survey. J. Sens. Actuator Netw. 2013, 2, 235-287. [CrossRef]
-
(2013)
J. Sens. Actuator Netw
, vol.2
, pp. 235-287
-
-
Ishaq, I.1
Carels, D.2
Teklemariam, G.K.3
Hoebeke, J.4
Abeele, F.V.D.5
Poorter, E.D.6
Demeester, P.7
-
12
-
-
23944432309
-
-
(accessed on 1 September 2016)
-
Molisch, A.F., Balakrishnan, K., Chong, C.C., Emami, S., Fort, A., Karedal, J., Siwiak, K. IEEE 802.15. 4a Channel Model-Final Report. Available online: http://www.ieee802.org/15/pub/04/15-04-0662-02-004achannel-model-final-report-r1.pdf (accessed on 1 September 2016).
-
IEEE 802.15. 4A Channel Model-Final Report
-
-
Molisch, A.F.1
Balakrishnan, K.2
Chong, C.C.3
Emami, S.4
Fort, A.5
Karedal, J.6
Siwiak, K.7
-
13
-
-
84858171962
-
Coap: An application protocol for billions of tiny internet nodes
-
[CrossRef]
-
Bormann, C., Castellani, A.P., Shelby, Z. Coap: An application protocol for billions of tiny internet nodes. IEEE Internet Comput. 2012, 16, 62. [CrossRef]
-
(2012)
IEEE Internet Comput
, vol.16
, pp. 62
-
-
Bormann, C.1
Castellani, A.P.2
Shelby, Z.3
-
14
-
-
83355164042
-
A low-power CoAP for Contiki
-
Valencia, Spain, 17-22 October
-
Kovatsch, M., Duquennoy, S., Dunkels, A. A low-power CoAP for Contiki. In Proceedings of the 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, Valencia, Spain, 17-22 October 2011, pp. 855-860.
-
(2011)
Proceedings of the 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems
, pp. 855-860
-
-
Kovatsch, M.1
Duquennoy, S.2
Dunkels, A.3
-
15
-
-
84864199559
-
6LoWPAN compressed DTLS for CoAP
-
Hangzhou, China, 18-20 May
-
Raza, S., Trabalza, D., Voigt, T. 6LoWPAN compressed DTLS for CoAP. In Proceedings of the 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, Hangzhou, China, 18-20 May 2012, pp. 287-289.
-
(2012)
Proceedings of the 2012 IEEE 8Th International Conference on Distributed Computing in Sensor Systems
, pp. 287-289
-
-
Raza, S.1
Trabalza, D.2
Voigt, T.3
-
16
-
-
84874293263
-
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication
-
Beach, FL, USA, 22-25 October
-
Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., Carle, G. A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In Proceedings of the 2012 IEEE 37th Conference on Local Computer Networks Workshops (LCN Workshops), Beach, FL, USA, 22-25 October 2012, pp. 956-963.
-
(2012)
Proceedings of the 2012 IEEE 37Th Conference on Local Computer Networks Workshops (LCN Workshops)
, pp. 956-963
-
-
Kothmayr, T.1
Schmitt, C.2
Hu, W.3
Brünig, M.4
Carle, G.5
-
17
-
-
84877604655
-
Lightweight Internet protocols for web enablement of sensors using constrained gateway devices
-
San Diego, CA, USA, 28-31 January
-
Bandyopadhyay, S., Bhattacharyya, A. Lightweight Internet protocols for web enablement of sensors using constrained gateway devices. In Proceedings of the IEEE 2013 International Conference on Computing, Networking and Communications (ICNC), San Diego, CA, USA, 28-31 January 2013, pp. 334-340.
-
(2013)
Proceedings of the IEEE 2013 International Conference on Computing, Networking and Communications (ICNC)
, pp. 334-340
-
-
Bandyopadhyay, S.1
Bhattacharyya, A.2
-
18
-
-
85116610435
-
Next century challenges: Mobile networking for “Smart Dust”
-
Seattle, WA, USA, 15-19 August
-
Kahn, J.M., Katz, R.H., Pister, K.S. Next century challenges: Mobile networking for “Smart Dust”. In Proceedings of the 5th Annual ACM/IEEE International Conference onMobile Computing and Networking, Seattle, WA, USA, 15-19 August 1999, pp. 271-278.
-
(1999)
Proceedings of the 5Th Annual ACM/IEEE International Conference Onmobile Computing and Networking
, pp. 271-278
-
-
Kahn, J.M.1
Katz, R.H.2
Pister, K.S.3
-
20
-
-
0035121216
-
Smart dust: Communicatingwith a cubic-millimeter computer
-
[CrossRef]
-
Warneke, B., Last, M., Liebowitz, B., Pister, K.S. Smart dust: Communicatingwith a cubic-millimeter computer. Computer 2011, 34, 44-51. [CrossRef]
-
(2011)
Computer
, vol.34
, pp. 44-51
-
-
Warneke, B.1
Last, M.2
Liebowitz, B.3
Pister, K.S.4
-
21
-
-
85002906203
-
Internet of Things: Smart Things
-
[CrossRef]
-
Madakam, S. Internet of Things: Smart Things. Int. J. Future Comput. Commun. 2015, 4, 250. [CrossRef]
-
(2015)
Int. J. Future Comput. Commun.
, vol.4
, pp. 250
-
-
Madakam, S.1
-
22
-
-
84900808158
-
A reconfigurable smart sensor interface for industrial WSN in IoT environment
-
Chi, Q., Yan, H., Zhang, C., Pang, Z., Da Xu, L. A reconfigurable smart sensor interface for industrial WSN in IoT environment. IEEE Trans. Ind. Inf. 2014, 10, 1417-1425.
-
(2014)
IEEE Trans. Ind. Inf
, vol.10
, pp. 1417-1425
-
-
Chi, Q.1
Yan, H.2
Zhang, C.3
Pang, Z.4
Da Xu, L.5
-
23
-
-
84900641617
-
Sensing as a service model for smart cities supported by internet of things
-
[CrossRef]
-
Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D. Sensing as a service model for smart cities supported by internet of things. Trans. Emerg. Telecommun. Technol. 2014, 25, 81-93. [CrossRef]
-
(2014)
Trans. Emerg. Telecommun. Technol
, vol.25
, pp. 81-93
-
-
Perera, C.1
Zaslavsky, A.2
Christen, P.3
Georgakopoulos, D.4
-
24
-
-
0005908666
-
Perfectly secure key distribution for dynamic conferences
-
[CrossRef]
-
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M. Perfectly secure key distribution for dynamic conferences. Inf. Comput. 1998, 146, 1-23. [CrossRef]
-
(1998)
Inf. Comput
, vol.146
, pp. 1-23
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
25
-
-
0000893265
-
An optimal class of symmetric key generation systems
-
Springer: Berlin/Heidelberg, Germany
-
Blom, R. An optimal class of symmetric key generation systems. In Workshop on the Theory and Application of Cryptographic Techniques, Springer: Berlin/Heidelberg, Germany, 1984, pp. 335-338.
-
(1984)
Workshop on the Theory and Application of Cryptographic Techniques
, pp. 335-338
-
-
Blom, R.1
-
26
-
-
64049117542
-
Predistribution and local collaboration-based group rekeying for wireless sensor networks
-
[CrossRef]
-
Zhang, W., Zhu, S., Cao, G. Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad Hoc Netw. 2009, 7, 1229-1242. [CrossRef]
-
(2009)
Ad Hoc Netw
, vol.7
, pp. 1229-1242
-
-
Zhang, W.1
Zhu, S.2
Cao, G.3
-
27
-
-
33847274741
-
A Level Key Infrastructure for Secure and Efficient Group Communication inWireless Sensor Network
-
Berlin, Germany, 30 May-1 June
-
Huang, J.H., Buckingham, J., Han, R. A Level Key Infrastructure for Secure and Efficient Group Communication inWireless Sensor Network. In Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Berlin, Germany, 30 May-1 June 2005, pp. 249-260.
-
(2005)
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
, pp. 249-260
-
-
Huang, J.H.1
Buckingham, J.2
Han, R.3
-
28
-
-
0005328993
-
Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor
-
Springer: Berlin/Heidelberg, Germany
-
Barrett, P. Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In Conference on the Theory and Application of Cryptographic Techniques, Springer: Berlin/Heidelberg, Germany, 1986, pp. 311-323.
-
(1986)
Conference on the Theory and Application of Cryptographic Techniques
, pp. 311-323
-
-
Barrett, P.1
-
29
-
-
84968503742
-
Elliptic curve cryptosystems
-
[CrossRef]
-
Koblitz, N. Elliptic curve cryptosystems. Math. Comput. 1987, 48, 203-209. [CrossRef]
-
(1987)
Math. Comput
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
31
-
-
70450229249
-
-
Ph.D. Thesis, McGill University, Montreal, QC, Canada
-
Saeki, M. Elliptic Curve Cryptosystems. Ph.D. Thesis, McGill University, Montreal, QC, Canada, 1997.
-
(1997)
Elliptic Curve Cryptosystems
-
-
Saeki, M.1
-
32
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
[CrossRef]
-
Neuman, B.C., Ts’o, T. Kerberos: An authentication service for computer networks. IEEE Commun. Mag. 1994, 32, 33-38. [CrossRef]
-
(1994)
IEEE Commun. Mag
, vol.32
, pp. 33-38
-
-
Neuman, B.C.1
Ts’O, T.2
-
33
-
-
33747064900
-
Public-key cryptography extensions into Kerberos
-
[CrossRef]
-
Downnard, I. Public-key cryptography extensions into Kerberos. IEEE Potentials 2002, 21, 30-34. [CrossRef]
-
(2002)
IEEE Potentials
, vol.21
, pp. 30-34
-
-
Downnard, I.1
-
34
-
-
4244111455
-
-
U.S. Patent 5,657,390, 12 August
-
Elgamal, T., Hickman, K.E. Secure Socket Layer Application Program Apparatus and Method. U.S. Patent 5,657,390, 12 August 1997.
-
(1997)
Secure Socket Layer Application Program Apparatus and Method
-
-
Elgamal, T.1
Hickman, K.E.2
-
35
-
-
84947778144
-
The decision diffie-hellman problem
-
Springer: Berlin/Heidelberg, Germany
-
Boneh, D. The decision diffie-hellman problem. In International Algorithmic Number Theory Symposium, Springer: Berlin/Heidelberg, Germany, 1998, pp. 48-63.
-
(1998)
International Algorithmic Number Theory Symposium
, pp. 48-63
-
-
Boneh, D.1
-
36
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Springer: Berlin/Heidelberg, Germany
-
Kocher, P.C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Annual International Cryptology Conference, Springer: Berlin/Heidelberg, Germany, 1996, pp. 104-113.
-
(1996)
Annual International Cryptology Conference
, pp. 104-113
-
-
Kocher, P.C.1
-
37
-
-
0033877788
-
Energy-efficient communication protocol for wireless microsensor networks
-
Maui, HI, USA, 4-7 January
-
Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 4-7 January 2000.
-
(2000)
Proceedings of the 33Rd Annual Hawaii International Conference on System Sciences
-
-
Heinzelman, W.R.1
Chandrakasan, A.2
Balakrishnan, H.3
-
38
-
-
85004103234
-
Sensor Authentication and Key Exchange Protocol for Energy Efficiency in Sensor Network Environment
-
Jeju, Korea, 17 February
-
Lee, J.S., Lee, A., Jun, M.S. Sensor Authentication and Key Exchange Protocol for Energy Efficiency in Sensor Network Environment. In Proceedings of the 2016 World Congress on Information Technology Applications and Services, Jeju, Korea, 17 February 2016.
-
(2016)
Proceedings of the 2016 World Congress on Information Technology Applications and Services
-
-
Lee, J.S.1
Lee, A.2
Jun, M.S.3
-
39
-
-
84994229624
-
A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks
-
[CrossRef]
-
Qin, D., Jia, S., Yang, S., Wang, E., Ding, Q. A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks. J. Sens. 2016. [CrossRef]
-
(2016)
J. Sens
-
-
Qin, D.1
Jia, S.2
Yang, S.3
Wang, E.4
Ding, Q.5
-
40
-
-
84961627565
-
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks
-
[CrossRef][PubMed]
-
Hayajneh, T., Mohd, B.J., Imran, M., Almashaqbeh, G., Vasilakos, A.V. Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks. Sensors 2016, 16, 424. [CrossRef] [PubMed]
-
(2016)
Sensors
, vol.16
, pp. 424
-
-
Hayajneh, T.1
Mohd, B.J.2
Imran, M.3
Almashaqbeh, G.4
Vasilakos, A.V.5
|