-
1
-
-
84939161468
-
A critical analysis on the security concerns of internet of things ( IoT )
-
M. Farooq, M. Waseem, A. Khairi, and S. Mazhar, "A Critical Analysis on the Security Concerns of Internet of Things ( IoT )," International Journal of Computer Applications, vol. 111, no. 7, pp. 1-6, 2015.
-
(2015)
International Journal of Computer Applications
, vol.111
, Issue.7
, pp. 1-6
-
-
Farooq, M.1
Waseem, M.2
Khairi, A.3
Mazhar, S.4
-
2
-
-
84942859708
-
Securely making things right
-
C. Kolias, A. Stavrou, and J. Voas, "Securely making things right," Computer, vol. 48, no. 9, pp. 84-88, 2015.
-
(2015)
Computer
, vol.48
, Issue.9
, pp. 84-88
-
-
Kolias, C.1
Stavrou, A.2
Voas, J.3
-
3
-
-
84918547291
-
The internet of things (IOT) applications and communication enabling technology standards: An overview
-
V. Bhuvaneswari and R. Porkodi, "The internet of things (IOT) applications and communication enabling technology standards: An overview," in International Conference on Intelligent Computing Applications, ICICA 2014, 2014, pp. 324-329.
-
(2014)
International Conference on Intelligent Computing Applications, ICICA
, vol.2014
, pp. 324-329
-
-
Bhuvaneswari, V.1
Porkodi, R.2
-
4
-
-
84906739578
-
Security analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT)
-
S. M. Sajjad and M. Yousaf, "Security analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT)," in 2014 Conference on Information Assurance and Cyber Security (CIACS), 2014, pp. 9-14. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6861324
-
(2014)
2014 Conference on Information Assurance and Cyber Security (CIACS)
, pp. 9-14
-
-
Sajjad, S.M.1
Yousaf, M.2
-
5
-
-
84876943063
-
Internet of Things (IoT): A vision, architectural elements, and future directions
-
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013. [Online]. Available: http://dx.doi.org/10.1016/j.future.2013.01.010
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
8
-
-
85019951636
-
-
I. Ishaq, D. Carels, G. Teklemariam, J. Hoebeke, F. Abeele, E. Poorter, I. Moerman, and P. Demeester, IETF Standardization in the Field of the Internet of Things (IoT): A Survey, 2013, vol. 2, no. 2. [Online]. Available: http://www.mdpi.com/2224-2708/2/2/235/htm
-
(2013)
IETF Standardization in the Field of the Internet of Things (IoT): A Survey
, vol.2
, Issue.2
-
-
Ishaq, I.1
Carels, D.2
Teklemariam, G.3
Hoebeke, J.4
Abeele, F.5
Poorter, E.6
Moerman, I.7
Demeester, P.8
-
9
-
-
84964677884
-
On the security and privacy of internet of things architectures and systems
-
E. Vasilomanolakis, J. Daubert, and M. Luthra, "On the Security and Privacy of Internet of Things Architectures and Systems," in Secure Internet of Things (SIoT 2015), 2015, pp. 49-57. [Online]. Available: https://www.informatik.tu-darmstadt.de/fileadmin/user upload/Group TK/filesDownload/Published Papers/SIoTpaper.pdf
-
Secure Internet of Things (SIoT 2015)
, vol.2015
, pp. 49-57
-
-
Vasilomanolakis, E.1
Daubert, J.2
Luthra, M.3
-
11
-
-
85000402260
-
Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks
-
M. Abomhara and G. M. Koien, "Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks," Journal of Cyber Security and Mobility, vol. 4, no. 1, pp. 65-88, 2015. [Online]. Available: http://www.riverpublishers.com/journal read html article.php?j=JCSM/4/1/4
-
(2015)
Journal of Cyber Security and Mobility
, vol.4
, Issue.1
, pp. 65-88
-
-
Abomhara, M.1
Koien, G.M.2
-
13
-
-
84964556793
-
Internet of things ( IoT ) security: Current status , challenges and prospective measures
-
R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, "Internet of Things ( IoT ) Security : Current Status , Challenges and Prospective Measures," in 10th International Conference for Internet Technology and Secured Transactions (ICITST), 2015, pp. 336-341.
-
(2015)
10th International Conference for Internet Technology and Secured Transactions (ICITST)
, pp. 336-341
-
-
Mahmoud, R.1
Yousuf, T.2
Aloul, F.3
Zualkernan, I.4
-
14
-
-
84942523308
-
Emerging security threats and countermeasures in IoT
-
Z. Z.-K., C. M.C.Y., and S. S., "Emerging security threats and countermeasures in IoT," in ASIACCS 2015-Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, 2015, pp. 1-6. [Online]. Available: http://www.scopus.com/inward/record. url?eid=2-s2.0-84942523308{&}partnerID=40{&}md5= 3c4a207d8590001416184468e21e3d27
-
(2015)
ASIACCS 2015-Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
, pp. 1-6
-
-
Zk, Z.1
Mcy, C.2
-
15
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Communications Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, 2006. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4109893
-
(2006)
IEEE Communications Surveys & Tutorials
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
16
-
-
84971517463
-
M2M Security: Challenges and Solutions
-
A. Barki, A. Bouabdallah, S. Gharout, and J. Traore, "M2M Security: Challenges and Solutions," IEEE Communications Surveys & Tutorials, no. c, pp. 1-1, 2016. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=7373528
-
(2016)
IEEE Communications Surveys & Tutorials
, vol.C
, pp. 1
-
-
Barki, A.1
Bouabdallah, A.2
Gharout, S.3
Traore, J.4
-
18
-
-
84919372488
-
Security, privacy and trust in Internet of Things: The road ahead
-
S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead," Computer Networks, vol. 76, pp. 146-164, 2015. [Online]. Available: http://dx.doi.org/10.1016/j.comnet.2014. 11.008
-
(2015)
Computer Networks
, vol.76
, pp. 146-164
-
-
Sicari, S.1
Rizzardi, A.2
Grieco, L.A.3
Coen-Porisini, A.4
-
19
-
-
84947785321
-
A view on privacy & trust in IoT
-
J. Daubert, A. Wiesmaier, and P. Kikiras, "A view on privacy & trust in IoT," in 2015 IEEE International Conference on Communication Workshop, ICCW 2015, 2015, pp. 2665-2670.
-
(2015)
2015 IEEE International Conference on Communication Workshop, ICCW 2015
, pp. 2665-2670
-
-
Daubert, J.1
Wiesmaier, A.2
Kikiras, P.3
-
20
-
-
78649989557
-
A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
-
http://dud. inf.tu-dresden.de/literatur/Anon Terminology v0.34.pdf
-
A. Pfitzmann and M. Hansen, "A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management," Tech. Rep., 2009. [Online]. Available: http://dud.inf.tu-dresden.de/Anon Terminology.shtml\delimiter"026E30Fnhttp://dud. inf.tu-dresden.de/literatur/Anon Terminology v0.34.pdf
-
(2009)
Tech. Rep.
-
-
Pfitzmann, A.1
Hansen, M.2
-
21
-
-
84864760629
-
-
IEEE Std. 802. 15.4
-
Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE Std. 802.15.4, 2011. [Online]. Available: http: //standards.ieee.org/getieee802/download/802.15.4-2011.pdf
-
(2011)
Low-Rate Wireless Personal Area Networks (LR-WPANs)
-
-
-
24
-
-
84871965024
-
-
2.4 GHz Texas Instruments, Dallas, USA
-
"2.4 GHz IEEE 802.15.4 /ZigBee-ready RF Transceiver (CC2420)," Texas Instruments, Dallas, USA. [Online]. Available: http://www.ti.com/lit/ds/symlink/cc2420.pdf
-
IEEE 802.15.4 /ZigBee-ready RF Transceiver (CC2420)
-
-
-
25
-
-
84871965024
-
-
2.4 GHz Texas Instruments Dallas, USA
-
"2.4 GHz IEEE 802.15.4 /ZigBee RF Transceiver (CC2520)," Texas Instruments, Dallas, USA. [Online]. Available: http://www.ti.com/lit/ds/symlink/cc2530.pdf
-
IEEE 802.15.4 /ZigBee RF Transceiver (CC2520)
-
-
-
27
-
-
85019856626
-
-
IEEE Tech. Rep
-
IEEE, "802.11-1997 standard," Tech. Rep. [Online]. Available: http://standards.ieee.org/getieee802/download/802. 11n-2009.pdf
-
802.11-1997 Standard
-
-
-
28
-
-
85019834607
-
-
IEEE Tech. Rep
-
-, "802.11n-2009 standard," Tech. Rep. [Online]. Available: http://standards.ieee.org/getieee802/download/802. 11ac-2013.pdf
-
802.11n-2009 Standard
-
-
-
29
-
-
85019923225
-
-
IEEE Tech. Rep
-
-, "802.11ac-2013 standard," Tech. Rep. [Online]. Available: https://standards.ieee.org/findstds/standard/802.11-1997. html
-
802.11ac-2013 Standard
-
-
-
31
-
-
84908218344
-
-
ISO Tech. Rep
-
ISO, "ISO/IEC 14443," Tech. Rep. [Online]. Available: http://www.iso.org/iso/home/store/catalogue ics/catalogue detail ics.htm?csnumber=70171
-
ISO/IEC 14443
-
-
-
32
-
-
85019910270
-
-
ISO Tech. Rep
-
-, "ISO/IEC 18092," Tech. Rep. [Online]. Available: http: //www.iso.org/iso/catalogue detail.htm?csnumber=56692
-
ISO/IEC 18092
-
-
-
33
-
-
85019873707
-
-
Sony Tech. Rep
-
Sony, "Felica," Tech. Rep. [Online]. Available: http://www.sony.net/Products/felica/business/tech-support/data/M830 NFC FeliCa 1.1e.pdf
-
Felica
-
-
-
34
-
-
85019848838
-
-
ISO Tech. Rep
-
ISO, "ISO/IEC 15693," Tech. Rep. [Online]. Available: http://www.iso.org/iso/iso catalogue/catalogue ics/catalogue detail ics.htm?csnumber=39694
-
ISO/IEC 15693
-
-
-
38
-
-
84980360179
-
-
LoRa Alliance, Inc., Tech. Rep.
-
N. Sornin, M. Luis, T. Eirich, T. Kramp, and O. Hersent, "LoRaWAN Specification," LoRa Alliance, Inc., Tech. Rep., 2015. [Online]. Available: https://www.lora-alliance. org/portals/0/specs/LoRaWANSpecification1R0.pdf
-
(2015)
LoRaWAN Specification
-
-
Sornin, N.1
Luis, M.2
Eirich, T.3
Kramp, T.4
Hersent, O.5
-
39
-
-
85019964702
-
-
"About z-wave technology." [Online]. Available: http: //z-wavealliance.org/about z-wave technology/
-
About Z-wave Technology
-
-
-
41
-
-
84941085241
-
Internet of things: A survey on enabling technologies, protocols, and applications
-
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications," IEEE Communications Surveys and Tutorials, vol. 17, no. 4, pp. 2347-2376, 2015.
-
(2015)
IEEE Communications Surveys and Tutorials
, vol.17
, Issue.4
, pp. 2347-2376
-
-
Al-Fuqaha, A.1
Guizani, M.2
Mohammadi, M.3
Aledhari, M.4
Ayyash, M.5
-
42
-
-
84969186063
-
Security evaluation of the Zwavewireless protocol
-
B. Fouladi and S. Ghanoun, "Security Evaluation of the ZWaveWireless Protocol," in Black Hat Conference, 2013, p. 6.
-
(2013)
Black Hat Conference
, pp. 6
-
-
Fouladi, B.1
Ghanoun, S.2
-
44
-
-
84969243995
-
Wireless intrusion detection of covert channel attacks in ITU-T G.9959-based networks
-
J. D. Fuller, B. W. Ramsey, J. Pecarina, and M. Rice, "Wireless intrusion detection of covert channel attacks in ITU-T G.9959-based networks," in Proceedings of the 11th International Conference on Cyber Warfare and Security, ICCWS 2016, 2016, pp. 137-145.
-
(2016)
Proceedings of the 11th International Conference on Cyber Warfare and Security, ICCWS
, vol.2016
, pp. 137-145
-
-
Fuller, J.D.1
Ramsey, B.W.2
Pecarina, J.3
Rice, M.4
-
45
-
-
85019901037
-
Specification of the bluetooth system
-
2, Dec
-
Specification of the Bluetooth System, Bluetooth SIG Core Specification, Rev. 4.2, Dec. 2014. [Online]. Available: https://www.bluetooth.org/DocMan/handlers/DownloadDoc.ashx?doc id=286439
-
(2014)
Bluetooth SIG Core Specification, Rev.
, vol.4
-
-
-
48
-
-
84867006336
-
Overview and evaluation of Bluetooth Low Energy: An emerging low-power wireless technology
-
C. Gomez, J. Oller, and J. Paradells, "Overview and evaluation of Bluetooth Low Energy: An emerging low-power wireless technology," Sensors, vol. 12, no. 9, pp. 11 734-11 753, 2012.
-
(2012)
Sensors
, vol.12
, Issue.9
, pp. 11734-11753
-
-
Gomez, C.1
Oller, J.2
Paradells, J.3
-
50
-
-
85027019633
-
-
Thread Group, Tech. Rep.
-
"Thread Stack Fundamentals," Thread Group, Tech. Rep., 2015.
-
(2015)
Thread Stack Fundamentals
-
-
-
51
-
-
85019964755
-
J-PAKE: Password authenticated key exchange by juggling
-
Jul work in Progress
-
F. Hao, "J-PAKE: Password Authenticated Key Exchange by Juggling," Internet Engineering Task Force, Internet-Draft draft-hao-jpake-04, Jul. 2016, work in Progress. [Online]. Available: https://tools.ietf.org/html/draft-hao-jpake-04
-
(2016)
Internet Engineering Task Force, Internet-Draft draft-hao-jpake-04
-
-
Hao, F.1
-
53
-
-
85019956267
-
-
Thread Group, Tech. Rep.
-
"Thread Commissioning," Thread Group, Tech. Rep., 2015.
-
(2015)
Thread Commissioning
-
-
-
54
-
-
38549155648
-
-
ZigBee Alliance Std. Document 053 474r17
-
ZigBee Specification, ZigBee Alliance Std. Document 053 474r17, 2008.
-
(2008)
ZigBee Specification
-
-
-
55
-
-
77958554487
-
Considerations on security in zigbee networks
-
IEEE, Jun
-
G. Dini and M. Tiloca, "Considerations on security in zigbee networks," in International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC). IEEE, Jun. 2010, pp. 58-65.
-
(2010)
International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC).
, pp. 58-65
-
-
Dini, G.1
Tiloca, M.2
-
56
-
-
77954318750
-
Recommended practices guide for securing zigbee wireless networks in process control system environments
-
K. Masica, "Recommended practices guide for securing zigbee wireless networks in process control system environments," Lawrence Livermore National Laboratory, Tech. Rep., 2007. [Online]. Available: http: //cms.doe.gov/sites/prod/files/oeprod/DocumentsandMedia/Securing ZigBee Wireless Networks.pdf
-
(2007)
Lawrence Livermore National Laboratory, Tech. Rep.
-
-
Masica, K.1
-
57
-
-
0013091373
-
-
NIST Std. FIPS-198-1
-
The Keyed-Hash Message Authentication Code (HMAC), NIST Std. FIPS-198-1, 2008. [Online]. Available: http://csrc. nist.gov/publications/fips/fips198-1/FIPS-198-1 final.pdf
-
(2008)
The Keyed-Hash Message Authentication Code (HMAC)
-
-
-
58
-
-
33746690237
-
Transmission of IPv6 Packets over
-
Sep.
-
G. Montenegro, J. Hui, D. Culler, and N. Kushalnagar, Transmission of IPv6 Packets over IEEE 802.15.4 Networks, Internet Engineering Task Force (IETF) Std. RFC 4944, Sep. 2007. [Online]. Available: https://tools.ietf.org/html/rfc4944
-
(2007)
IEEE 802.15.4 Networks, Internet Engineering Task Force (IETF) Std. RFC 4944
-
-
Montenegro, G.1
Hui, J.2
Culler, D.3
Kushalnagar, N.4
-
59
-
-
85019882939
-
-
Oct
-
Z. Shelby, J. Nieminen, T. Savolainen, M. Isomaki, B. Patil, and C. Gomez, IPv6 over BLUETOOTH(R) Low Energy, Internet Engineering Task Force (IETF) Std. RFC 7668, Oct. 2015. [Online]. Available: https://tools.ietf.org/html/rfc7668
-
(2015)
IPv6 over BLUETOOTH(R) Low Energy Internet Engineering Task Force (IETF) Std. RFC 7668
-
-
Shelby, Z.1
Nieminen, J.2
Savolainen, T.3
Isomaki, M.4
Patil, B.5
Gomez, C.6
-
62
-
-
85019891131
-
Transmission of IPv6 packets over DECT Ultra Low Energy
-
Mar Work in Progress
-
P. B. Mariager, J. T. Petersen, M. van de Logt, D. Barthel, and Z. Shelby, "Transmission of IPv6 packets over DECT Ultra Low Energy," Internet Engineering Task Force (IETF), Internet-Draft draft-ietf-6lo-dect-ule-05, Mar. 2016, Work in Progress. [Online]. Available: https://tools.ietf.org/html/draft-ietf-6lo-dect-ule-05
-
(2016)
Internet Engineering Task Force (IETF), Internet-Draft draft-ietf-6lo-dect-ule-05
-
-
Mariager, P.B.1
Petersen, J.T.2
Van De, L.M.3
Barthel, D.4
Shelby, Z.5
-
63
-
-
85019939312
-
Transmission of IPv6 over MS/TP networks
-
Jun Work in Progress
-
K. Lynn, J. Martocci, C. Neilson, and S. Donaldson, "Transmission of IPv6 over MS/TP networks," Internet Engineering Task Force (IETF), Internet-Draft draft-ietf-6lo-6lobac-05, Jun. 2016, Work in Progress. [Online]. Available: https://tools.ietf.org/html/draft-ietf-6lo-6lobac-05
-
(2016)
Internet Engineering Task Force (IETF), Internet-Draft draft-ietf-6lo-6lobac-05
-
-
Lynn, K.1
Martocci, J.2
Neilson, C.3
Donaldson, S.4
-
64
-
-
84884992599
-
-
S. Raza, T. Chung, S. Duquennoy, T. Voigt, U. Roedig et al., "Securing internet of things with lightweight ipsec," 2010.
-
(2010)
Securing Internet of Things with Lightweight Ipsec
-
-
Raza, S.1
Chung, T.2
Duquennoy, S.3
Voigt, T.4
Roedig, U.5
-
65
-
-
80052500073
-
Securing communication in 6LoWPAN with compressed IPsec
-
S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt, and U. Roedig, "Securing communication in 6LoWPAN with compressed IPsec," in International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS). IEEE, 2011, pp. 1-8.
-
(2011)
International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS). IEEE
, pp. 1-8
-
-
Raza, S.1
Duquennoy, S.2
Chung, T.3
Yazar, D.4
Voigt, T.5
Roedig, U.6
-
66
-
-
84911865485
-
Secure communication for the Internet of Things-A comparison of link-layer security and IPsec for 6LoWPAN
-
S. Raza, S. Duquennoy, J. Hoglund, U. Roedig, and T. Voigt, "Secure communication for the Internet of Things-A comparison of link-layer security and IPsec for 6LoWPAN," Security and Communication Networks, vol. 7, no. 12, pp. 2654-2668, 2014.
-
(2014)
Security and Communication Networks
, vol.7
, Issue.12
, pp. 2654-2668
-
-
Raza, S.1
Duquennoy, S.2
Hoglund, J.3
Roedig, U.4
Voigt, T.5
-
67
-
-
84964958468
-
-
Mar.
-
A. Brandt, J. Vasseur, J. Hui, K. Pister, P. Thubert, P. Levis, R. Struik, R. Kelsey, T. H. Clausen, and T. Winter, RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks, Internet Engineering Task Force (IETF) Std. RFC 6550, Mar. 2012. [Online]. Available: https://tools.ietf.org/html/rfc6550
-
(2012)
RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks Internet Engineering Task Force (IETF) Std. RFC 6550
-
-
Brandt, A.1
Vasseur, J.2
Hui, J.3
Pister, K.4
Thubert, P.5
Levis, P.6
Struik, R.7
Kelsey, R.8
Clausen, T.H.9
Winter, T.10
-
71
-
-
0003470642
-
Security architecture for the internet protocol
-
S. Kent and K. Seo, "Security architecture for the internet protocol," Tech. Rep. [Online]. Available: https://tools.ietf.org/html/rfc4301
-
Tech. Rep
-
-
Kent, S.1
Seo, K.2
-
72
-
-
79955764516
-
Internet key exchange protocol version 2 (ikev2)
-
C. Kaufman, P. Hoffman, Y. Nir, and P. Eronen, "Internet key exchange protocol version 2 (ikev2)," Tech. Rep. [Online]. Available: https://tools.ietf.org/html/rfc5996
-
Tech. Rep
-
-
Kaufman, C.1
Hoffman, P.2
Nir, Y.3
Eronen, P.4
-
73
-
-
67650697114
-
Why is ipsec a viable option for wireless sensor networks
-
J. Granjal, R. Silva, E. Monteiro, J. S. Silva, and F. Boavida, "Why is ipsec a viable option for wireless sensor networks," in 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems. IEEE, 2008, pp. 802-807.
-
(2008)
2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems. IEEE
, pp. 802-807
-
-
Granjal, J.1
Silva, R.2
Monteiro, E.3
Silva, J.S.4
Boavida, F.5
-
74
-
-
85019881935
-
Cryptographic algorithm implementation requirements and usage guidance for encapsulating security payload (ESP) and authentication header (AH)
-
D. McGrew and P. Hoffman, "Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)," Tech. Rep. [Online]. Available: https://tools.ietf.org/html/rfc7321
-
Tech. Rep
-
-
McGrew, D.1
Hoffman, P.2
-
75
-
-
84858171962
-
CoAP: An application protocol for billions of tiny internet nodes
-
C. Bormann, A. P. Castellani, and Z. Shelby, "CoAP: An application protocol for billions of tiny internet nodes," IEEE Internet Computing, vol. 16, no. 2, pp. 62-67, 2012.
-
(2012)
IEEE Internet Computing
, vol.16
, Issue.2
, pp. 62-67
-
-
Bormann, C.1
Castellani, A.P.2
Shelby, Z.3
-
76
-
-
84924277319
-
The constrained application protocol (CoAP)
-
Oct
-
C. Bormann, K. Hartke, and Z. Shelby, "The Constrained Application Protocol (CoAP)," RFC 7252, Oct. 2015. [Online]. Available: https://rfc-editor.org/rfc/rfc7252.txt
-
(2015)
RFC
, vol.7252
-
-
Bormann, C.1
Hartke, K.2
Shelby, Z.3
-
78
-
-
35248893214
-
Datagram transport layer security
-
Oct
-
E. Rescorla and N. Modadugu, "Datagram Transport Layer Security," RFC 4347, Oct. 2015. [Online]. Available: https://rfc-editor.org/rfc/rfc4347.txt
-
(2015)
RFC
, vol.4347
-
-
Rescorla, E.1
Modadugu, N.2
-
79
-
-
84938672829
-
Security for the internet of things: A survey of existing protocols and open research issues
-
J. Granjal, E. Monteiro, and J. S. Silva, "Security for the Internet of Things : A Survey of Existing Protocols and Open Research Issues," IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1294-1312, 2015.
-
(2015)
IEEE Communications Surveys & Tutorials
, vol.17
, Issue.3
, pp. 1294-1312
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.S.3
-
81
-
-
84883314073
-
Lithe: Lightweight secure CoAP for the internet of things
-
S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: Lightweight secure CoAP for the internet of things," IEEE Sensors Journal, vol. 13, no. 10, pp. 3711-3720, 2013.
-
(2013)
IEEE Sensors Journal
, vol.13
, Issue.10
, pp. 3711-3720
-
-
Raza, S.1
Shafagh, H.2
Hewage, K.3
Hummen, R.4
Voigt, T.5
-
82
-
-
84919978090
-
Securing the internet of things: A standardization perspective
-
S. L. Keoh, S. S. Kumar, and H. Tschofenig, "Securing the internet of things: A standardization perspective," IEEE Internet of Things Journal, vol. 1, no. 3, pp. 265-275, 2014.
-
(2014)
IEEE Internet of Things Journal
, vol.1
, Issue.3
, pp. 265-275
-
-
Keoh, S.L.1
Kumar, S.S.2
Tschofenig, H.3
-
83
-
-
85019958209
-
Compression of record and handshake headers for constrained environments
-
Sep work in Progress
-
S. Raza, H. Shafagh, and O. Dupont, "Compression of Record and Handshake Headers for Constrained Environments," Internet Engineering Task Force, Internet-Draft draft-raza-dice-compressed-dtls-00, Sep. 2014, work in Progress. [Online]. Available: https://tools.ietf.org/html/draft-raza-dice-compressed-dtls-00
-
(2014)
Internet Engineering Task Force, Internet-Draft draft-raza-dice-compressed-dtls-00
-
-
Raza, S.1
Shafagh, H.2
Dupont, O.3
-
84
-
-
51849104270
-
MQTT-S A publish/subscribe protocol for Wireless Sensor Networks
-
U. Hunkeler, H. L. Truong, and A. Stanford-Clark, "MQTT-S A publish/subscribe protocol for Wireless Sensor Networks," 3rd International Conference on Communication Systems Software and Middleware and Workshops, pp. 791-791, 2008.
-
(2008)
3rd International Conference on Communication Systems Software and Middleware and Workshops
, pp. 791
-
-
Hunkeler, U.1
Truong, H.L.2
Stanford-Clark, A.3
-
85
-
-
84946950129
-
Secure MQTT for internet of things (IoT)
-
M. Singh, M. A. Rajan, V. L. Shivraj, and P. Balamuralidhar, "Secure MQTT for Internet of Things (IoT)," Proceedings-2015 5th International Conference on Communication Systems and Network Technologies, CSNT 2015, no. 4, pp. 746-751, 2015.
-
(2015)
Proceedings-2015 5th International Conference on Communication Systems and Network Technologies, CSNT
, vol.2015
, Issue.4
, pp. 746-751
-
-
Singh, M.1
Rajan, M.A.2
Shivraj, V.L.3
Balamuralidhar, P.4
-
87
-
-
80054062253
-
Extensible messaging and presence protocol (XMPP): Core
-
P. Saint-Andre, "Extensible Messaging and Presence Protocol (XMPP) : Core," Internet Engineering Task Force, pp. 1-212, 2011.
-
(2011)
Internet Engineering Task Force
, pp. 1-212
-
-
Saint-Andre, P.1
-
88
-
-
33751354607
-
Advanced message queuing protocol
-
S. Vinoski, "Advanced message queuing protocol," IEEE Internet Computing, vol. 10, no. 6, pp. 87-89, 2006.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.6
, pp. 87-89
-
-
Vinoski, S.1
-
89
-
-
84891588850
-
Performance evaluation of RESTful web services and AMQP protocol
-
J. L. Fernandes, I. C. Lopes, J. J. P. C. Rodrigues, and S. Ullah, "Performance evaluation of RESTful web services and AMQP protocol," International Conference on Ubiquitous and Future Networks, ICUFN, pp. 810-815, 2013.
-
(2013)
International Conference on Ubiquitous and Future Networks, ICUFN
, pp. 810-815
-
-
Fernandes, J.L.1
Lopes, I.C.2
Rodrigues, J.J.P.C.3
Ullah, S.4
|