-
1
-
-
79951801836
-
Iot gateway: Bridging wireless sensor networks into internet of things
-
Dec.
-
Q. Zhu, R. Wang, Q. Chen, Y. Liu, and W. Qin, "Iot gateway: Bridging wireless sensor networks into internet of things," in Proceedings of EUC 2010, Dec 2010.
-
(2010)
Proceedings of EUC 2010
-
-
Zhu, Q.1
Wang, R.2
Chen, Q.3
Liu, Y.4
Qin, W.5
-
2
-
-
84866409323
-
-
April, [online; accessed 16-Septemeber-2016]
-
D. Evans, "The internet of things," https://www.cisco.com/c/dam/en us/about/ac79/docs/innov/IoT IBSG 0411FINAL.pdf, April 2011, [online; accessed 16-Septemeber-2016].
-
(2011)
The Internet of Things
-
-
Evans, D.1
-
3
-
-
84890609381
-
-
May, [online; accessed 16-Septemeber-2016]
-
J. Manyika et al., "Disruptive technologies: Advances that will transform life, business, and the global economy," http://www.mckinsey.com/business-functions/digital-mckinsey/ourinsights/disruptive-technologies, May 2013, [online; accessed 16-Septemeber-2016].
-
(2013)
Disruptive Technologies: Advances That Will Transform Life, Business, and the Global Economy
-
-
Manyika, J.1
-
4
-
-
84876943063
-
Internet of things (iot): A vision, architectural elements, and future directions
-
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of things (iot): A vision, architectural elements, and future directions," Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
5
-
-
80052854156
-
Securing the internet of things
-
Sept
-
R. Roman, P. Najera, and J. Lopez, "Securing the internet of things," Computer, vol. 44, no. 9, pp. 51-58, Sept 2011.
-
(2011)
Computer
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
7
-
-
85032277654
-
Security in internet of things: Opportunities and challenges
-
Oct.
-
K. Sha, W. Wei, A. Yang, and W. Shi, "Security in internet of things: Opportunities and challenges," in Proceedings of IIKI 2016, Oct 2016.
-
(2016)
Proceedings of IIKI 2016
-
-
Sha, K.1
Wei, W.2
Yang, A.3
Shi, W.4
-
8
-
-
84900625968
-
A survey on the internet of things security
-
Dec.
-
K. Zhao and L. Ge, "A survey on the internet of things security," in Proceedings of CIS 2013, Dec 2013.
-
(2013)
Proceedings of CIS 2013
-
-
Zhao, K.1
Ge, L.2
-
11
-
-
84921461758
-
Securing smart home: Technologies, security challenges, and security requirements
-
IEEE
-
C. Lee, L. Zappaterra, K. Choi, and H.-A. Choi, "Securing smart home: Technologies, security challenges, and security requirements," in Proceedings of IEEE CNS 2014. IEEE, 2014.
-
(2014)
Proceedings of IEEE CNS 2014
-
-
Lee, C.1
Zappaterra, L.2
Choi, K.3
Choi, H.-A.4
-
15
-
-
85027254642
-
-
NIST, August, [online; accessed 16-Septemeber-2016]
-
NIST, "Report on lightweight cryptography," http://csrc.nist.gov/publications/drafts/nistir-8114/nistir 8114 draft.pdf, August 2016, [online; accessed 16-Septemeber-2016].
-
(2016)
Report on Lightweight Cryptography
-
-
-
16
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
Feb.
-
N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, "A study of the energy consumption characteristics of cryptographic algorithms and security protocols," IEEE Transactions on Mobile Computing, vol. 5, no. 2, pp. 128-143, Feb 2006.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
17
-
-
84883314073
-
Lithe: Lightweight secure coap for the internet of things
-
Oct.
-
S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: Lightweight secure coap for the internet of things," IEEE Sensors Journal, vol. 13, no. 10, pp. 3711-3720, Oct 2013.
-
(2013)
IEEE Sensors Journal
, vol.13
, Issue.10
, pp. 3711-3720
-
-
Raza, S.1
Shafagh, H.2
Hewage, K.3
Hummen, R.4
Voigt, T.5
-
18
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557-570, 2002.
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
19
-
-
85037101633
-
A secure and efficient framework to read isolated smart grid devices
-
K. Sha, N. Alatrash, and Z. Wang, "A secure and efficient framework to read isolated smart grid devices," IEEE Transactions on Smart Grid, vol. PP, no. 99, pp. 1-13, 2016.
-
(2016)
IEEE Transactions on Smart Grid
, vol.PP
, Issue.99
, pp. 1-13
-
-
Sha, K.1
Alatrash, N.2
Wang, Z.3
-
20
-
-
33746613037
-
-
Internet Requests for Comments, RFC Editor, RFC 6347, Jan. [Online]
-
E. Rescorla and N. Modadugu, "Datagram Transport Layer Security Version 1.2," Internet Requests for Comments, RFC Editor, RFC 6347, Jan 2012. [Online]. Available: https://tools.ietf.org/html/rfc6347
-
(2012)
Datagram Transport Layer Security Version 1.2
-
-
Rescorla, E.1
Modadugu, N.2
-
21
-
-
83055185853
-
-
Internet Requests for Comments, RFC Editor, RFC, Jan. [Online]
-
R. Moskowitz and R. Hummen, "HIP Diet EXchange (DEX)," Internet Requests for Comments, RFC Editor, RFC, Jan 2016. [Online]. Available: https://tools.ietf.org/html/draft-moskowitz-hip-dex-05
-
(2016)
HIP Diet EXchange (DEX)
-
-
Moskowitz, R.1
Hummen, R.2
-
23
-
-
84874293263
-
A dtls based end-to-end security architecture for the internet of things with two-way authentication
-
Oct.
-
T. Kothmayr, C. Schmitt, W. Hu, M. Brnig, and G. Carle, "A dtls based end-to-end security architecture for the internet of things with two-way authentication," in Proceedings of LCN Workshops 2012, Oct 2012.
-
(2012)
Proceedings of LCN Workshops 2012
-
-
Kothmayr, T.1
Schmitt, C.2
Hu, W.3
Brnig, M.4
Carle, G.5
-
24
-
-
84896280670
-
Lightweight collaborative key establishment scheme for the internet of things
-
Y. B. Saied, A. Olivereau, D. Zeghlache, and M. Laurent, "Lightweight collaborative key establishment scheme for the internet of things," Computer Networks, vol. 64, pp. 273-295, 2014.
-
(2014)
Computer Networks
, vol.64
, pp. 273-295
-
-
Saied, Y.B.1
Olivereau, A.2
Zeghlache, D.3
Laurent, M.4
-
25
-
-
85009753144
-
A novel authentication and key agreement protocol for internet of things based resource-constrained body area sensors
-
Aug.
-
M. A. Iqbal and M. Bayoumi, "A novel authentication and key agreement protocol for internet of things based resource-constrained body area sensors," in Proceedings of FiCloud Workshop 2016, Aug 2016.
-
(2016)
Proceedings of FiCloud Workshop 2016
-
-
Iqbal, M.A.1
Bayoumi, M.2
-
26
-
-
84963721336
-
A distributed security mechanism for resourceconstrained iot devices
-
J. King and A. I. Awad, "A distributed security mechanism for resourceconstrained iot devices," Informatica, vol. 40, no. 1, 2016.
-
(2016)
Informatica
, vol.40
, Issue.1
-
-
King, J.1
Awad, A.I.2
-
27
-
-
84960157592
-
-
May
-
M. W. Condry and C. B. Nelson, "Using smart edge iot devices for safer, rapid response with industry iot control operations," vol. 104, no. 5, May 2016, pp. 938-946.
-
(2016)
Using Smart Edge Iot Devices for Safer, Rapid Response with Industry Iot Control Operations
, vol.104
, Issue.5
, pp. 938-946
-
-
Condry, M.W.1
Nelson, C.B.2
-
28
-
-
84927741456
-
Virtualized security at the network edge: A user-centric approach
-
D. Montero, M. Yannuzzi, A. Shaw, L. Jacquin, A. Pastor, R. Serral-Gracia, A. Lioy, F. Risso, C. Basile, R. Sassu et al., "Virtualized security at the network edge: A user-centric approach," IEEE Communications Magazine, vol. 53, no. 4, pp. 176-186, 2015.
-
(2015)
IEEE Communications Magazine
, vol.53
, Issue.4
, pp. 176-186
-
-
Montero, D.1
Yannuzzi, M.2
Shaw, A.3
Jacquin, L.4
Pastor, A.5
Serral-Gracia, R.6
Lioy, A.7
Risso, F.8
Basile, C.9
Sassu, R.10
|