-
1
-
-
84899547581
-
FromM2M communications to the internet of things: Opportunities and challenges
-
J. N. Al-Karaki, K.-C. Chen, G.Morabito, and J. d. Oliveira, "FromM2M communications to the internet of things: Opportunities and challenges," Ad Hoc Netw., vol. 18, pp. 1-2, 2014.
-
(2014)
Ad Hoc Netw.
, vol.18
, pp. 1-2
-
-
Al-Karaki, J.N.1
Chen, K.-C.2
Morabito, G.3
Oliveira, J.D.4
-
2
-
-
84923122221
-
Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyberphysical systems
-
Apr.
-
I. Stojmenovic, "Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyberphysical systems," IEEE Internet Things J., vol. 1, no. 2, pp. 122-128, Apr. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.2
, pp. 122-128
-
-
Stojmenovic, I.1
-
3
-
-
84894673236
-
M2M service platforms: Survey, issues, and enabling technologies
-
First Quarter
-
J.Kim, J. Lee, J. Kim, and J.Yun, "M2M service platforms: Survey, issues, and enabling technologies," IEEE Commun. Surveys. Tuts., vol. 16, no. 1, pp. 61-76, First Quarter 2014.
-
(2014)
IEEE Commun. Surveys. Tuts.
, vol.16
, Issue.1
, pp. 61-76
-
-
Kim, J.1
Lee, J.2
Kim, J.3
Yun, J.4
-
4
-
-
79953774779
-
Connecting low-power and lossy networks to the internet
-
Apr.
-
J. Ko, A. Terzis, S. Dawson-Haggerty, D. E. Culler, J. W. Hui, and P. Levis, "Connecting low-power and lossy networks to the internet," IEEE Commun. Mag., vol. 49, no. 4, pp. 96-101, Apr. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.4
, pp. 96-101
-
-
Ko, J.1
Terzis, A.2
Dawson-Haggerty, S.3
Culler, D.E.4
Hui, J.W.5
Levis, P.6
-
5
-
-
84961620802
-
An IoT-aware architecture for smart healthcare systems
-
Dec.
-
L. Catarinucci et al., "An IoT-aware architecture for smart healthcare systems," IEEE Internet Things J., vol. 2, no. 6, pp. 515-526, Dec. 2015.
-
(2015)
IEEE Internet Things J.
, vol.2
, Issue.6
, pp. 515-526
-
-
Catarinucci, L.1
-
6
-
-
84930268203
-
Feasibility and performance evaluation of a 6LoWPANenabled platform for ubiquitous healthcare monitoring
-
F. Touati, A. B. Mnaouer, O. Erdene-Ochir, W. Mehmood, A. Hassan, and B. Gaabab, "Feasibility and performance evaluation of a 6LoWPANenabled platform for ubiquitous healthcare monitoring," Wireless Commun. Mobile Comput., vol. 16, pp. 1271-1281, 2016.
-
(2016)
Wireless Commun. Mobile Comput.
, vol.16
, pp. 1271-1281
-
-
Touati, F.1
Mnaouer, A.B.2
Erdene-Ochir, O.3
Mehmood, W.4
Hassan, A.5
Gaabab, B.6
-
7
-
-
84961079547
-
A PKI adapted model for secure information dissemination in industrial control and automation 6LoWPANs
-
Jun.
-
S. Misra, S. Goswami, C. Taneja, A. Mukherjee, and M. S. Obaidat, "A PKI adapted model for secure information dissemination in industrial control and automation 6LoWPANs," IEEE Access, vol. 3, pp. 875-889, Jun. 2015.
-
(2015)
IEEE Access
, vol.3
, pp. 875-889
-
-
Misra, S.1
Goswami, S.2
Taneja, C.3
Mukherjee, A.4
Obaidat, M.S.5
-
8
-
-
84900549152
-
A simple data-muling protocol
-
May
-
P.B.Val, M. G.Valls, and M. B. Cunado, "A simple data-muling protocol," IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 895-902, May 2014.
-
(2014)
IEEE Trans. Ind. Informat.
, vol.10
, Issue.2
, pp. 895-902
-
-
Val, P.B.1
Valls, M.G.2
Cunado, M.B.3
-
9
-
-
84908448624
-
Security protocols and privacy issues into 6LoWPAN stack: A synthesis
-
Oct.
-
C. Hennebert and J. D. Santos, "Security protocols and privacy issues into 6LoWPAN stack: A synthesis," IEEE Internet Things J., vol. 1, no. 5, pp. 384-398, Oct. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.5
, pp. 384-398
-
-
Hennebert, C.1
Santos, J.D.2
-
10
-
-
84891714668
-
Denial-ofservice detection in 6LoWPAN based internet of things
-
P. Kasinathan, C. Pastrone, M. A. Spirito, and M. Vinkovits, "Denial-ofservice detection in 6LoWPAN based internet of things," in Proc. 2013 IEEE 9th Int. Conf. Wireless Mobile Comput., Netw. Commun., 2013, pp. 600-607.
-
(2013)
Proc. 2013 IEEE 9th Int. Conf. Wireless Mobile Comput., Netw. Commun.
, pp. 600-607
-
-
Kasinathan, P.1
Pastrone, C.2
Spirito, M.A.3
Vinkovits, M.4
-
11
-
-
84885413739
-
Network admission control solution for 6LoWPAN networks
-
L. M. L. Oliveira, J. J. P. C. Rodrigues, C. Neto, and A. F. de Sousa, "Network admission control solution for 6LoWPAN networks," in Proc. 2013 7th Int. Conf. Innovative Mobile Internet Serv. Ubiquitous Comput., 2013, pp. 472-477.
-
(2013)
Proc. 2013 7th Int. Conf. Innovative Mobile Internet Serv. Ubiquitous Comput.
, pp. 472-477
-
-
Oliveira, L.M.L.1
Rodrigues, J.J.P.C.2
Neto, C.3
De Sousa, A.F.4
-
12
-
-
80052447165
-
Securing communication in 6LoWPAN with compressed IPsec
-
S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt, and U. Roedig, "Securing communication in 6LoWPAN with compressed IPsec," in Proc. 2011 Int. Conf. Distrib. Comput. Sensor Syst. Workshops, 2011, pp. 1-8.
-
(2011)
Proc. 2011 Int. Conf. Distrib. Comput. Sensor Syst. Workshops
, pp. 1-8
-
-
Raza, S.1
Duquennoy, S.2
Chung, T.3
Yazar, D.4
Voigt, T.5
Roedig, U.6
-
13
-
-
84891591283
-
SAKES: Secure authentication and key establishment scheme forM2M communication in the IP-based wireless sensor network (6LoWPAN)
-
H. R. Hussen, G. A. Tizazu, T. Miao, L. Taekkyeun, C. Youngjun, and K. Ki-Hyung, "SAKES: Secure authentication and key establishment scheme forM2M communication in the IP-based wireless sensor network (6LoWPAN)," in Proc. 2013 5th Int. Conf.Ubiquitous Future Netw., 2013, pp. 246-251.
-
(2013)
Proc. 2013 5th Int. Conf.Ubiquitous Future Netw.
, pp. 246-251
-
-
Hussen, H.R.1
Tizazu, G.A.2
Miao, T.3
Taekkyeun, L.4
Youngjun, C.5
Ki-Hyung, K.6
-
14
-
-
84944111806
-
A security authentication scheme in machine-to-machine home network service
-
X. Sun, S. Men, C. Zhao, and Z. Zhou, "A security authentication scheme in machine-to-machine home network service," Security Commun. Netw., vol. 8, pp. 2678-2686, 2012.
-
(2012)
Security Commun. Netw.
, vol.8
, pp. 2678-2686
-
-
Sun, X.1
Men, S.2
Zhao, C.3
Zhou, Z.4
-
15
-
-
84904112065
-
A dynamic-encryption authentication scheme for M2M security in cyber-physical systems
-
S. Chen and M. Ma, "A dynamic-encryption authentication scheme for M2M security in cyber-physical systems," in Proc. 2013 IEEE Global Commun. Conf., 2013, pp. 2897-2901.
-
(2013)
Proc. 2013 IEEE Global Commun. Conf.
, pp. 2897-2901
-
-
Chen, S.1
Ma, M.2
-
16
-
-
84865236311
-
An efficient handover authentication scheme with privacy preservation for
-
A. Fu, Y. Zhang, Z. Zhu, Q. Jing, and J. Feng, "An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network," Comput. Security, vol. 31, pp. 741-749, 2012.
-
(2012)
IEEE 802.16m Network Comput. Security
, vol.31
, pp. 741-749
-
-
Fu, A.1
Zhang, Y.2
Zhu, Z.3
Jing, Q.4
Feng, J.5
-
17
-
-
84947491809
-
Ticket-based authentication for fast handover in wireless mesh networks
-
X. Zhang, G. Li, and W. Han, "Ticket-based authentication for fast handover in wireless mesh networks," Wireless Pers. Commun., vol. 85, pp. 1509-1523, 2015.
-
(2015)
Wireless Pers. Commun.
, vol.85
, pp. 1509-1523
-
-
Zhang, X.1
Li, G.2
Han, W.3
-
18
-
-
84892614267
-
A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities
-
Dec.
-
Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. A. McCann, and L. Kin, "A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities," IEEE Wireless Commun., vol. 20, no. 6, pp. 91-98, Dec. 2013.
-
(2013)
IEEE Wireless Commun.
, vol.20
, Issue.6
, pp. 91-98
-
-
Sheng, Z.1
Yang, S.2
Yu, Y.3
Vasilakos, A.4
McCann, J.A.5
Kin, L.6
-
19
-
-
84863281882
-
IPv6 over low power WPAN security analysis
-
S. Park, K. Kim, W. Haddad, S. Chakrabarti, and J. Laganier, "IPv6 over low power WPAN security analysis," IETF Internet Draft Draft-6lowpan-Security-Analysis-05, 2011.
-
(2011)
IETF Internet Draft Draft-6lowpan-Security-Analysis-05
-
-
Park, S.1
Kim, K.2
Haddad, W.3
Chakrabarti, S.4
Laganier, J.5
-
20
-
-
0020720357
-
On the security of public key protocols
-
Mar.
-
D. Dolev and A. C. Yao, "On the security of public key protocols," IEEE Trans. Inf. Theory, vol. 29, no. 2, pp. 198-208, Mar. 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
21
-
-
84885395306
-
Neighbor discovery optimization for IPv6 over low-power wireless personal area networks (6LoWPANs)
-
Z. Shelby, S. Chakrabarti, E. Nordmark, and C. Bormann, "Neighbor discovery optimization for IPv6 over low-power wireless personal area networks (6LoWPANs)," IETF RFC 6775, 2012.
-
IETF RFC
, vol.6775
, pp. 2012
-
-
Shelby, Z.1
Chakrabarti, S.2
Nordmark, E.3
Bormann, C.4
-
22
-
-
33847655213
-
Protocol composition logic (PCL)
-
A. Datta, A. Derek, J. C. Mitchell, and A. Roy, "Protocol composition logic (PCL)," Electron. Notes Theor. Comput. Sci., vol. 172, pp. 311-358, 2007.
-
(2007)
Electron. Notes Theor. Comput. Sci.
, vol.172
, pp. 311-358
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Roy, A.4
-
23
-
-
48949094875
-
On the protocol composition logic PCL
-
Tokyo, Japan
-
C. Cremers, "On the protocol composition logic PCL," in Proc. ACM Symp. Inf., Comput. Commun. Security, Tokyo, Japan, 2008, pp. 66-76.
-
(2008)
Proc. ACM Symp. Inf., Comput. Commun. Security
, pp. 66-76
-
-
Cremers, C.1
-
24
-
-
85027698261
-
-
The AVISPA Team, AVISPA v1.1 User Manual, Jun. [Online]. Available
-
The AVISPA Team, AVISPA v1.1 User Manual, Jun. 2006. [Online]. Available: Http://www.avispa-project.org/package/user-manual.pdf
-
(2006)
-
-
-
25
-
-
34547420699
-
How public key cryptography influences wireless sensor node lifetime
-
Alexandria, VA, USA
-
K. Piotrowski, P. Langendoerfer, and S. Peter, "How public key cryptography influences wireless sensor node lifetime," in Proc. 4th ACM Workshop Security Ad Hoc Sensor Netw., Alexandria, VA, USA, 2006, pp. 169-176.
-
(2006)
Proc. 4th ACM Workshop Security Ad Hoc Sensor Netw.
, pp. 169-176
-
-
Piotrowski, K.1
Langendoerfer, P.2
Peter, S.3
-
26
-
-
78650373178
-
MoteAODV-An AODV implementation for tinyOS 2.0
-
P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis, and D. Sauveron, Eds. Berlin, Germany: Springer-Verlag
-
W. Backes and J. Cordasco, "MoteAODV-An AODV implementation for tinyOS 2.0," Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices, vol. 6033, P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis, and D. Sauveron, Eds. Berlin, Germany: Springer-Verlag, 2010, pp. 154-169.
-
(2010)
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices
, vol.6033
, pp. 154-169
-
-
Backes, W.1
Cordasco, J.2
|