-
1
-
-
77956877124
-
The internet of things: A survey
-
Atzori, L., Iera, A., Morabito, G., The internet of things: A survey. Comput. Netw. 54:15 (2010), 2787–2805.
-
(2010)
Comput. Netw.
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
2
-
-
85042014932
-
-
Springer Publishing Company, Incorporated
-
Giusto, D., Iera, A., Morabito, G., Atzori, L., The Internet of Things: 20th Tyrrhenian Workshop on Digital Communications, 2014, Springer Publishing Company, Incorporated.
-
(2014)
The Internet of Things: 20th Tyrrhenian Workshop on Digital Communications
-
-
Giusto, D.1
Iera, A.2
Morabito, G.3
Atzori, L.4
-
3
-
-
85042007199
-
-
Lenovo shows off a pair of intel-powered smart shoes. URL
-
B. Heater, Lenovo shows off a pair of intel-powered smart shoes, 2016. URL https://techcrunch.com/2016/06/09/lenovo-smart-shoes/.
-
(2016)
-
-
Heater, B.1
-
4
-
-
85042033926
-
-
Internet of things. URL
-
M. Rouse, I. Wigmore, Internet of things, 2016. URL http://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT.
-
(2016)
-
-
Rouse, M.1
Wigmore, I.2
-
5
-
-
85028719579
-
Cognitive-radio-based internet of things: Applications, architectures, spectrum related functionalities, and future research directions
-
Khan, A.A., Rehmani, M.H., Rachedi, A., Cognitive-radio-based internet of things: Applications, architectures, spectrum related functionalities, and future research directions. IEEE Wirel. Commun. 24:3 (2017), 17–25, 10.1109/MWC.2017.1600404.
-
(2017)
IEEE Wirel. Commun.
, vol.24
, Issue.3
, pp. 17-25
-
-
Khan, A.A.1
Rehmani, M.H.2
Rachedi, A.3
-
6
-
-
84960418981
-
White space: Definitional perspectives and their role in exploiting spectrum opportunities
-
Akhtar, F., Rehmani, M.H., Reisslein, M., White space: Definitional perspectives and their role in exploiting spectrum opportunities. Telecommun. Policy 40:4 (2016), 319–331, 10.1016/j.telpol.2016.01.003.
-
(2016)
Telecommun. Policy
, vol.40
, Issue.4
, pp. 319-331
-
-
Akhtar, F.1
Rehmani, M.H.2
Reisslein, M.3
-
7
-
-
85017561368
-
Internet of things security: A survey
-
Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F., Internet of things security: A survey. J. Netw. Comput. Appl. 88:Suppl. C (2017), 10–28, 10.1016/j.jnca.2017.04.002.
-
(2017)
J. Netw. Comput. Appl.
, vol.88
, pp. 10-28
-
-
Alaba, F.A.1
Othman, M.2
Hashem, I.A.T.3
Alotaibi, F.4
-
8
-
-
84938672829
-
Security for the internet of things: A Survey of existing protocols and open research issues
-
Granjal, J., Monteiro, E., Silva, J.S., Security for the internet of things: A Survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17:3 (2015), 1294–1312, 10.1109/COMST.2015.2388550.
-
(2015)
IEEE Commun. Surv. Tutor.
, vol.17
, Issue.3
, pp. 1294-1312
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.S.3
-
9
-
-
79955712919
-
Key management systems for sensor networks in the context of the internet of things
-
Modern Trends in Applied Security: Architectures, Implementations and Applications
-
Roman, R., Alcaraz, C., Lopez, J., Sklavos, N., Key management systems for sensor networks in the context of the internet of things. Comput. Electr. Eng. 37:2 (2011), 147–159 Modern Trends in Applied Security: Architectures, Implementations and Applications.
-
(2011)
Comput. Electr. Eng.
, vol.37
, Issue.2
, pp. 147-159
-
-
Roman, R.1
Alcaraz, C.2
Lopez, J.3
Sklavos, N.4
-
10
-
-
67650697114
-
Why is IPSec a viable option for wireless sensor networks
-
Granjal, J., Silva, R., Monteiro, E., Silva, J.S., Boavida, F., Why is IPSec a viable option for wireless sensor networks. 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008, 802–807, 10.1109/MAHSS.2008.4660130.
-
(2008)
2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems
, pp. 802-807
-
-
Granjal, J.1
Silva, R.2
Monteiro, E.3
Silva, J.S.4
Boavida, F.5
-
11
-
-
84880413059
-
Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview
-
Cirani, S., Ferrari, G., Veltri, L., Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview. Algorithms 6:2 (2013), 197–226, 10.3390/a6020197.
-
(2013)
Algorithms
, vol.6
, Issue.2
, pp. 197-226
-
-
Cirani, S.1
Ferrari, G.2
Veltri, L.3
-
12
-
-
84894652457
-
A survey of intrusion detection systems in wireless sensor networks
-
Butun, I., Morgera, S.D., Sankar, R., A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16:1 (2014), 266–282, 10.1109/SURV.2013.050113.00191.
-
(2014)
IEEE Commun. Surv. Tutor.
, vol.16
, Issue.1
, pp. 266-282
-
-
Butun, I.1
Morgera, S.D.2
Sankar, R.3
-
13
-
-
84881313532
-
On the vital areas of intrusion detection systems in wireless sensor networks
-
Abduvaliyev, A., Pathan, A.-S.K., Zhou, J., Roman, R., Wong, W.-C., On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 15:3 (2013), 1223–1237, 10.1109/SURV.2012.121912.00006.
-
(2013)
IEEE Commun. Surv. Tutor.
, vol.15
, Issue.3
, pp. 1223-1237
-
-
Abduvaliyev, A.1
Pathan, A.-S.K.2
Zhou, J.3
Roman, R.4
Wong, W.-C.5
-
14
-
-
84900637145
-
Review: a survey of intrusion detection in wireless network applications
-
Mitchell, R., Chen, I.-R., Review: a survey of intrusion detection in wireless network applications. Comput. Commun. 42 (2014), 1–23, 10.1016/j.comcom.2014.01.012.
-
(2014)
Comput. Commun.
, vol.42
, pp. 1-23
-
-
Mitchell, R.1
Chen, I.-R.2
-
15
-
-
85041774197
-
Security and privacy issues of fog computing: A survey
-
Wireless Algorithms, Systems, and Applications the 10th International Conference on
-
S. Yi, Z. Qin, Q. Li, Security and privacy issues of fog computing: A survey, in: Wireless Algorithms, Systems, and Applications the 10th International Conference on, 2015, pp. 1–10.
-
(2015)
, pp. 1-10
-
-
Yi, S.1
Qin, Z.2
Li, Q.3
-
16
-
-
84962076525
-
Fog computing: Issues and challenges in security and forensics
-
Wang, Y., Uehara, T., Sasaki, R., Fog computing: Issues and challenges in security and forensics. 2015 IEEE 39th Annual Computer Software and Applications Conference, vol. 3, 2015, 53–59, 10.1109/COMPSAC.2015.173.
-
(2015)
2015 IEEE 39th Annual Computer Software and Applications Conference, vol. 3
, pp. 53-59
-
-
Wang, Y.1
Uehara, T.2
Sasaki, R.3
-
17
-
-
84919372488
-
Security, privacy and trust in internet of things: The road ahead
-
Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A., Security, privacy and trust in internet of things: The road ahead. Comput. Netw. 76:Suppl. C (2015), 146–164, 10.1016/j.comnet.2014.11.008.
-
(2015)
Comput. Netw.
, vol.76
, pp. 146-164
-
-
Sicari, S.1
Rizzardi, A.2
Grieco, L.3
Coen-Porisini, A.4
-
18
-
-
85008245198
-
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
-
Roman, R., Lopez, J., Mambo, M., Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst., 2016, 10.1016/j.future.2016.11.009.
-
(2016)
Future Gener. Comput. Syst.
-
-
Roman, R.1
Lopez, J.2
Mambo, M.3
-
19
-
-
70350755889
-
Internet of things and privacy preserving technologies
-
Oleshchuk, V., Internet of things and privacy preserving technologies. 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace Electronic Systems Technology, 2009, 336–340, 10.1109/WIRELESSVITAE.2009.5172470.
-
(2009)
2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace Electronic Systems Technology
, pp. 336-340
-
-
Oleshchuk, V.1
-
20
-
-
85009959911
-
Security and privacy for cloud-based IoT: Challenges
-
Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V., Security and privacy for cloud-based IoT: Challenges. IEEE Commun. Mag. 55:1 (2017), 26–33, 10.1109/MCOM.2017.1600363CM.
-
(2017)
IEEE Commun. Mag.
, vol.55
, Issue.1
, pp. 26-33
-
-
Zhou, J.1
Cao, Z.2
Dong, X.3
Vasilakos, A.V.4
-
21
-
-
84920514918
-
IoT security: Ongoing challenges and research opportunities
-
Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., Shieh, S., IoT security: Ongoing challenges and research opportunities. 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, 2014, 230–234, 10.1109/SOCA.2014.58.
-
(2014)
2014 IEEE 7th International Conference on Service-Oriented Computing and Applications
, pp. 230-234
-
-
Zhang, Z.K.1
Cho, M.C.Y.2
Wang, C.W.3
Hsu, C.W.4
Chen, C.K.5
Shieh, S.6
-
22
-
-
85042013308
-
-
IoT-A, Internet of Things–Architecture IoT-A Deliverable D1.5 –Final architectural reference model for the IoT v3.0. URL
-
IoT-A, Internet of Things–Architecture IoT-A Deliverable D1.5 –Final architectural reference model for the IoT v3.0, 2013. URL http://iotforum.org/wp-content/uploads/2014/09/D1.5-20130715-VERYFINAL.pdf.
-
(2013)
-
-
-
23
-
-
85042031482
-
-
Top IoT Vulnerabilities. URL
-
OWASP, Top IoT Vulnerabilities, 2016. URL https://www.owasp.org/index.php/Top_IoT_Vulnerabilities.
-
(2016)
-
-
OWASP1
-
24
-
-
85042055527
-
-
IeEEE Standard for Local and metropolitan networks–Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs). URL
-
IEEE, IeEEE Standard for Local and metropolitan networks–Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs), 2012. URL https://standards.ieee.org/findstds/standard/802.15.4-2011.html.
-
(2012)
-
-
IEEE1
-
25
-
-
85041992929
-
-
Rfc 6550 - rpl: ipv6 routing protocol for low-power and lossy networks. URL
-
T. Winter, P. Thubert, A. Brandt, J.W. Hui, R. Kelsey, Rfc 6550 - rpl: ipv6 routing protocol for low-power and lossy networks, 2012. URL https://tools.ietf.org/html/rfc6550.
-
(2012)
-
-
Winter, T.1
Thubert, P.2
Brandt, A.3
Hui, J.W.4
Kelsey, R.5
-
26
-
-
85041999431
-
-
User datagram protocol. URL
-
J. Postel, User datagram protocol, 1980. URL https://tools.ietf.org/html/rfc768.
-
(1980)
-
-
Postel, J.1
-
27
-
-
85042016297
-
-
Compression format for IPv6 datagrams over IEEE 802.15.4-based networks. URL
-
J.W. Hui, P. Thubert, Compression format for IPv6 datagrams over IEEE 802.15.4-based networks, 2011. URL https://tools.ietf.org/html/rfc6282.
-
(2011)
-
-
Hui, J.W.1
Thubert, P.2
-
28
-
-
85042044241
-
-
Internet control message protocol (ICMPv6) for the internet protocol version 6 (IPv6) specification. URL
-
A. Conta, S. Deering, M. Gupta, Internet control message protocol (ICMPv6) for the internet protocol version 6 (IPv6) specification, 2006. URL https://tools.ietf.org/html/rfc4443.
-
(2006)
-
-
Conta, A.1
Deering, S.2
Gupta, M.3
-
29
-
-
85042019807
-
-
The constrained application protocol (CoAP). URL
-
Z. Shelby, K. Hartke, C. Bormann, The constrained application protocol (CoAP), 2014. URL https://tools.ietf.org/html/rfc7252.
-
(2014)
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
-
30
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
ACM New York, NY, USA
-
Xu, W., Trappe, W., Zhang, Y., Wood, T., The feasibility of launching and detecting jamming attacks in wireless networks. Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc ’05, 2005, ACM, New York, NY, USA, 46–57, 10.1145/1062689.1062697.
-
(2005)
Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc ’05
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
31
-
-
29844445404
-
Low-power DoS attacks in data wireless LANs and countermeasures
-
Noubir, G., Lin, G., Low-power DoS attacks in data wireless LANs and countermeasures. SIGMOBILE Mob. Comput. Commun. Rev. 7:3 (2003), 29–30.
-
(2003)
SIGMOBILE Mob. Comput. Commun. Rev.
, vol.7
, Issue.3
, pp. 29-30
-
-
Noubir, G.1
Lin, G.2
-
32
-
-
84907451520
-
Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone
-
Chae, S.H., Choi, W., Lee, J.H., Quek, T.Q.S., Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone. Trans. Info. for. Sec. 9:10 (2014), 1617–1628, 10.1109/TIFS.2014.2341453.
-
(2014)
Trans. Info. for. Sec.
, vol.9
, Issue.10
, pp. 1617-1628
-
-
Chae, S.H.1
Choi, W.2
Lee, J.H.3
Quek, T.Q.S.4
-
33
-
-
85032751776
-
Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches
-
Hong, Y.-W.P., Lan, P.-C., Kuo, C.-C.J., Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches. IEEE Signal Process. Mag. 30:5 (2013), 29–40.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 29-40
-
-
Hong, Y.-W.P.1
Lan, P.-C.2
Kuo, C.-C.J.3
-
34
-
-
69749083720
-
Channel-Based detection of sybil attacks in wireless networks
-
Xiao, L., Greenstein, L.J., Mandayam, N.B., Trappe, W., Channel-Based detection of sybil attacks in wireless networks. IEEE Transa. Inf. Forensics Secur. 4:3 (2009), 492–503.
-
(2009)
IEEE Transa. Inf. Forensics Secur.
, vol.4
, Issue.3
, pp. 492-503
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
35
-
-
48049094399
-
Detecting and localizing wireless spoofing attacks
-
4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2017
-
Y. Chen, W. Trappe, R.P. Martin, Detecting and localizing wireless spoofing attacks, in: 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2017, pp. 193–202.
-
(2007)
, pp. 193-202
-
-
Chen, Y.1
Trappe, W.2
Martin, R.P.3
-
36
-
-
79960435863
-
A survey of recent intrusion detection systems for wireless sensor network
-
Wyld D.C. Wozniak M. Chaki N. Meghanathan N. Nagamalai D. Springer Berlin Heidelberg Berlin, Heidelberg
-
Bhattasali, T., Chaki, R., A survey of recent intrusion detection systems for wireless sensor network. Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D., (eds.) Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15–17, 2011, 2011, Springer Berlin Heidelberg, Berlin, Heidelberg, 268–280.
-
(2011)
Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15–17, 2011
, pp. 268-280
-
-
Bhattasali, T.1
Chaki, R.2
-
38
-
-
84879533211
-
6LoWPAN Fragmentation attacks and mitigation mechanisms
-
ACM New York, NY, USA
-
Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., Wehrle, K., 6LoWPAN Fragmentation attacks and mitigation mechanisms. Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec ’13, 2013, ACM, New York, NY, USA, 55–66, 10.1145/2462096.2462107.
-
(2013)
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec ’13
, pp. 55-66
-
-
Hummen, R.1
Hiller, J.2
Wirtz, H.3
Henze, M.4
Shafagh, H.5
Wehrle, K.6
-
39
-
-
70449633122
-
Security analysis survey and framework design for IP connected LoWPANs
-
Riaz, R., Kim, K.-H., Ahmed, H.F., Security analysis survey and framework design for IP connected LoWPANs. 2009 International Symposium on Autonomous Decentralized Systems, 2009, 1–6, 10.1109/ISADS.2009.5207373.
-
(2009)
2009 International Symposium on Autonomous Decentralized Systems
, pp. 1-6
-
-
Riaz, R.1
Kim, K.-H.2
Ahmed, H.F.3
-
40
-
-
83355172286
-
VeRA - version number and rank authentication in RPL
-
Dvir, A., Holczer, T., Buttyan, L., VeRA - version number and rank authentication in RPL. 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, 2011, 709–714, 10.1109/MASS.2011.76.
-
(2011)
2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems
, pp. 709-714
-
-
Dvir, A.1
Holczer, T.2
Buttyan, L.3
-
41
-
-
84874568172
-
Evaluating sinkhole defense techniques in RPL networks
-
IEEE Computer Society Washington, DC, USA
-
Weekly, K., Pister, K., Evaluating sinkhole defense techniques in RPL networks. Proceedings of the 2012 20th IEEE International Conference on Network Protocols (ICNP), ICNP ’12, 2012, IEEE Computer Society, Washington, DC, USA, 1–6, 10.1109/ICNP.2012.6459948.
-
(2012)
Proceedings of the 2012 20th IEEE International Conference on Network Protocols (ICNP), ICNP ’12
, pp. 1-6
-
-
Weekly, K.1
Pister, K.2
-
42
-
-
85001907801
-
Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks
-
SCN-16-0443.R1
-
Ahmed, F., Ko, Y.-B., Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks. Secur. Commun. Netw. 9:18 (2016), 5143–5154 SCN-16-0443.R1.
-
(2016)
Secur. Commun. Netw.
, vol.9
, Issue.18
, pp. 5143-5154
-
-
Ahmed, F.1
Ko, Y.-B.2
-
43
-
-
85042025030
-
Circumventing sinkholes and wormholes in wireless sensor networks
-
International Workshop on Wireless Ad-Hoc Networks.
-
A.A. Pirzada, C. McDonald, Circumventing sinkholes and wormholes in wireless sensor networks, in: International Workshop on Wireless Ad-Hoc Networks, 2005.
-
(2005)
-
-
Pirzada, A.A.1
McDonald, C.2
-
44
-
-
84899740998
-
Visualisation of wormholes in underwater sensor networks: A distributed approach
-
Wang, W., Kong, J., Bhargava, B., Gerla, M., Visualisation of wormholes in underwater sensor networks: A distributed approach. Int. J. Secur. Netw. 3:1 (2008), 10–23.
-
(2008)
Int. J. Secur. Netw.
, vol.3
, Issue.1
, pp. 10-23
-
-
Wang, W.1
Kong, J.2
Bhargava, B.3
Gerla, M.4
-
45
-
-
84991666120
-
Design of sinkhole node detection mechanism for hierarchical wireless sensor networks
-
Wazid, M., Das, A.K., Kumari, S., Khan, M.K., Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Sec. Commun. Netw. 9:17 (2016), 4596–4614, 10.1002/sec.1652.
-
(2016)
Sec. Commun. Netw.
, vol.9
, Issue.17
, pp. 4596-4614
-
-
Wazid, M.1
Das, A.K.2
Kumari, S.3
Khan, M.K.4
-
46
-
-
84908454906
-
Sybil attacks and their defenses in the internet of things
-
Zhang, K., Liang, X., Lu, R., Shen, X., Sybil attacks and their defenses in the internet of things. IEEE Internet Things J. 1:5 (2014), 372–383, 10.1109/JIOT.2014.2344013.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.5
, pp. 372-383
-
-
Zhang, K.1
Liang, X.2
Lu, R.3
Shen, X.4
-
47
-
-
84947274737
-
Social turing tests: Crowdsourcing sybil detection
-
Symposium on Network and Distributed System Security, NDSS.
-
G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. Metzger, H. Zheng, B.Y. Zhao, Social turing tests: Crowdsourcing sybil detection, in: Symposium on Network and Distributed System Security, NDSS, 2013.
-
(2013)
-
-
Wang, G.1
Mohanlal, M.2
Wilson, C.3
Wang, X.4
Metzger, M.5
Zheng, H.6
Zhao, B.Y.7
-
48
-
-
84911987280
-
Network-layer security for the Internet of Things using TinyOS and BLIP
-
Granjal, J., Monteiro, E., Silva, J.S., Network-layer security for the Internet of Things using TinyOS and BLIP. Int. J. Commun. Syst. 27:10 (2014), 1938–1963, 10.1002/dac.2444.
-
(2014)
Int. J. Commun. Syst.
, vol.27
, Issue.10
, pp. 1938-1963
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.S.3
-
49
-
-
80052447165
-
Securing communication in 6LoWPAN with compressed IPsec
-
Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., Roedig, U., Securing communication in 6LoWPAN with compressed IPsec. 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011, 1–8, 10.1109/DCOSS.2011.5982177.
-
(2011)
2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS)
, pp. 1-8
-
-
Raza, S.1
Duquennoy, S.2
Chung, T.3
Yazar, D.4
Voigt, T.5
Roedig, U.6
-
50
-
-
79551621444
-
Enabling network-layer security on IPv6 wireless sensor networks
-
Granjal, J., Monteiro, E., Silva, J.S., Enabling network-layer security on IPv6 wireless sensor networks. 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010, 1–6, 10.1109/GLOCOM.2010.5684293.
-
(2010)
2010 IEEE Global Telecommunications Conference GLOBECOM 2010
, pp. 1-6
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.S.3
-
51
-
-
85002424663
-
Identity authentication and capability based access control (iacac) for the internet of things
-
Mahalle, P.N., Anggorojati, B., Prasad, N.R., Prasad, R., Identity authentication and capability based access control (iacac) for the internet of things. J. Cyber Secur. Mobility 1:4 (2013), 309–348.
-
(2013)
J. Cyber Secur. Mobility
, vol.1
, Issue.4
, pp. 309-348
-
-
Mahalle, P.N.1
Anggorojati, B.2
Prasad, N.R.3
Prasad, R.4
-
52
-
-
85002424663
-
Identity authentication and capability based access control (IACAC) for the Internet of Things
-
Sinthan, D.U., Balamurugan, M.-S., Identity authentication and capability based access control (IACAC) for the Internet of Things. J. Cyber Secur. Mob. 1:4 (2013), 309–348.
-
(2013)
J. Cyber Secur. Mob.
, vol.1
, Issue.4
, pp. 309-348
-
-
Sinthan, D.U.1
Balamurugan, M.-S.2
-
53
-
-
84867699061
-
Security for practical CoAP applications: Issues and solution approaches
-
10th GI/ITG KuVS Fachgespraech Sensornetze (FGSN 2011).
-
M. Brachmann, O. Garcia-Morchon, M. Kirsche, Security for practical CoAP applications: Issues and solution approaches, in: 10th GI/ITG KuVS Fachgespraech Sensornetze (FGSN 2011), 2011.
-
(2011)
-
-
Brachmann, M.1
Garcia-Morchon, O.2
Kirsche, M.3
-
54
-
-
84890847807
-
End-to-end transport-layer security for internet-integrated sensing applications with mutual and delegated ecc public-key authentication
-
IFIP Networking Conference, 2013
-
J. Granjal, E. Monteiro, J.S. Silva, End-to-end transport-layer security for internet-integrated sensing applications with mutual and delegated ecc public-key authentication, in: 2013 IFIP Networking Conference, 2013, pp. 1–9.
-
(2013)
, pp. 1-9
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.S.3
-
55
-
-
84930456695
-
BlinkToSCoAP: An end-to-end security framework for the Internet of Things
-
Peretti, G., Lakkundi, V., Zorzi, M., BlinkToSCoAP: An end-to-end security framework for the Internet of Things. 2015 7th International Conference on Communication Systems and Networks (COMSNETS), 2015, 1–6, 10.1109/COMSNETS.2015.7098708.
-
(2015)
2015 7th International Conference on Communication Systems and Networks (COMSNETS)
, pp. 1-6
-
-
Peretti, G.1
Lakkundi, V.2
Zorzi, M.3
-
56
-
-
85042019063
-
-
Ev2: a key management solution for both the compressed IPsec and the IEEE 802.15. 4 security, in: Proceedings of the IETF Workshop on Smart Object Security
-
S. Raza, T. Voigt, V. Jutvik, Lightweight IKEv2: a key management solution for both the compressed IPsec and the IEEE 802.15. 4 security, in: Proceedings of the IETF Workshop on Smart Object Security, vol. 23, 2012.
-
(2012)
, vol.23
-
-
Raza, S.1
Voigt, T.2
Jutvik, V.3
Lightweight, I.K.4
-
57
-
-
84952054527
-
Mutual authentication scheme in secure internet of things technology for comfortable lifestyle
-
20–20
-
Park, N., Kang, N., Mutual authentication scheme in secure internet of things technology for comfortable lifestyle. Sensors, 6(1), 2016 20–20.
-
(2016)
Sensors
, vol.6
, Issue.1
-
-
Park, N.1
Kang, N.2
-
58
-
-
84991768903
-
Octopus: An edge-fog mutual authentication scheme
-
Ibrahim, M.H., Octopus: An edge-fog mutual authentication scheme. Internat. J. Netw. Secur. 18:6 (2016), 1089–1101.
-
(2016)
Internat. J. Netw. Secur.
, vol.18
, Issue.6
, pp. 1089-1101
-
-
Ibrahim, M.H.1
-
59
-
-
85032350664
-
Distributed configuration, authorization and management in the cloud-based internet of things
-
Henze, M., Wolters, B., Matzutt, R., Zimmermann, T., Wehrle, K., Distributed configuration, authorization and management in the cloud-based internet of things. 2017 IEEE Trustcom/BigDataSE/ICESS, 2017, 185–192, 10.1109/Trustcom/BigDataSE/ICESS.2017.236.
-
(2017)
2017 IEEE Trustcom/BigDataSE/ICESS
, pp. 185-192
-
-
Henze, M.1
Wolters, B.2
Matzutt, R.3
Zimmermann, T.4
Wehrle, K.5
-
60
-
-
84867755083
-
End-to-end transport security in the IP-based Internet of Things
-
Brachmann, M., Keoh, S.L., Morchon, O.G., Kumar, S.S., End-to-end transport security in the IP-based Internet of Things. 2012 21st International Conference on Computer Communications and Networks, ICCCN, 2012, 1–5, 10.1109/ICCCN.2012.6289292.
-
(2012)
2012 21st International Conference on Computer Communications and Networks, ICCCN
, pp. 1-5
-
-
Brachmann, M.1
Keoh, S.L.2
Morchon, O.G.3
Kumar, S.S.4
-
61
-
-
84883437259
-
Application-layer security for the WoT: extending CoAP to support end-to-end message security for internet-integrated sensing applications
-
Springer Berlin Heidelberg
-
Granjal, J., Monteiro, E., Silva, J.S., Application-layer security for the WoT: extending CoAP to support end-to-end message security for internet-integrated sensing applications. International Conference on Wired/Wireless Internet Communication, 2013, Springer Berlin Heidelberg, 140–153.
-
(2013)
International Conference on Wired/Wireless Internet Communication
, pp. 140-153
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.S.3
-
62
-
-
84874291090
-
End-to-end security for sleepy smart object networks
-
Sethi, M., Arkko, J., Kernen, A., End-to-end security for sleepy smart object networks. 37th Annual IEEE Conference on Local Computer Networks - Workshops, 2012, 964–972, 10.1109/LCNW.2012.6424089.
-
(2012)
37th Annual IEEE Conference on Local Computer Networks - Workshops
, pp. 964-972
-
-
Sethi, M.1
Arkko, J.2
Kernen, A.3
-
63
-
-
84867824901
-
The VIRTUS middleware: An XMPP based architecture for secure IoT communications
-
Conzon, D., Bolognesi, T., Brizzi, P., Lotito, A., Tomasi, R., Spirito, M.A., The VIRTUS middleware: An XMPP based architecture for secure IoT communications. 2012 21st International Conference on Computer Communications and Networks, ICCCN, 2012, 1–6, 10.1109/ICCCN.2012.6289309.
-
(2012)
2012 21st International Conference on Computer Communications and Networks, ICCCN
, pp. 1-6
-
-
Conzon, D.1
Bolognesi, T.2
Brizzi, P.3
Lotito, A.4
Tomasi, R.5
Spirito, M.A.6
-
64
-
-
84899656447
-
Efficient naming, addressing and profile services in Internet-of-Things sensory environments
-
Liu, C.H., Yang, B., Liu, T., Efficient naming, addressing and profile services in Internet-of-Things sensory environments. Ad Hoc Netw. 18:Suppl. C (2014), 85–101, 10.1016/j.adhoc.2013.02.008.
-
(2014)
Ad Hoc Netw.
, vol.18
, pp. 85-101
-
-
Liu, C.H.1
Yang, B.2
Liu, T.3
-
65
-
-
84857915658
-
Overcoming adversaries in sensor networks: A survey of theoretical models and algorithmic approaches for tolerating malicious interference
-
Young, M., Boutaba, R., Overcoming adversaries in sensor networks: A survey of theoretical models and algorithmic approaches for tolerating malicious interference. IEEE Commun. Surv. Tutor. 13:4 (2011), 617–641, 10.1109/SURV.2011.041311.00156.
-
(2011)
IEEE Commun. Surv. Tutor.
, vol.13
, Issue.4
, pp. 617-641
-
-
Young, M.1
Boutaba, R.2
-
66
-
-
11244260535
-
Channel surfing and spatial retreats: Defenses against wireless denial of service
-
ACM New York, NY, USA
-
Xu, W., Wood, T., Trappe, W., Zhang, Y., Channel surfing and spatial retreats: Defenses against wireless denial of service. Proceedings of the 3rd ACM Workshop on Wireless Security, WiSe ’04, 2004, ACM, New York, NY, USA, 80–89, 10.1145/1023646.1023661.
-
(2004)
Proceedings of the 3rd ACM Workshop on Wireless Security, WiSe ’04
, pp. 80-89
-
-
Xu, W.1
Wood, T.2
Trappe, W.3
Zhang, Y.4
-
67
-
-
84981187904
-
The role of physical layer security in IoT: A novel perspective
-
Pecorella, T., Brilli, L., Muchhi, L., The role of physical layer security in IoT: A novel perspective. Information, 7(3), 2016.
-
(2016)
Information
, vol.7
, Issue.3
-
-
Pecorella, T.1
Brilli, L.2
Muchhi, L.3
-
68
-
-
33845926634
-
An RSSI-based scheme for sybil attack detection in wireless sensor networks
-
IEEE Computer Society Washington, DC, USA
-
Demirbas, M., Song, Y., An RSSI-based scheme for sybil attack detection in wireless sensor networks. Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, WOWMOM ’06, 2006, IEEE Computer Society, Washington, DC, USA, 564–570, 10.1109/WOWMOM.2006.27.
-
(2006)
Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, WOWMOM ’06
, pp. 564-570
-
-
Demirbas, M.1
Song, Y.2
-
69
-
-
39049085785
-
Light-weight detection of spoofing attacks in wireless networks
-
IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2006
-
Q. Li, W. Trappe, Light-weight detection of spoofing attacks in wireless networks, in: 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2006, pp. 845–851.
-
(2006)
, pp. 845-851
-
-
Li, Q.1
Trappe, W.2
-
70
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
Xiao, L., Greenstein, L., Mandayam, N., Trappe, W., Fingerprints in the ether: Using the physical layer for wireless authentication. 2007 IEEE International Conference on Communications, 2007, 4646–4651, 10.1109/ICC.2007.767.
-
(2007)
2007 IEEE International Conference on Communications
, pp. 4646-4651
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
71
-
-
85018313683
-
Applications of elliptic curve cryptography: A light introduction to elliptic curves and a survey of their applications
-
ACM New York, NY, USA
-
Harkanson, R., Kim, Y., Applications of elliptic curve cryptography: A light introduction to elliptic curves and a survey of their applications. Proceedings of the 12th Annual Conference on Cyber and Information Security Research, CISRC ’17, 2017, ACM, New York, NY, USA, 6:1–6:7, 10.1145/3064814.3064818.
-
(2017)
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, CISRC ’17
, pp. 61-67
-
-
Harkanson, R.1
Kim, Y.2
-
72
-
-
85042000338
-
-
- US Secure Hash Algorithm 1 (SHA1). URL, 3174
-
D. Eastlake, P.E. Jones, RFC 3174 - US Secure Hash Algorithm 1 (SHA1), 2001. URL https://tools.ietf.org/html/rfc3174.
-
(2001)
-
-
Eastlake, D.1
Jones, P.E.2
RFC3
-
73
-
-
85042018633
-
-
HMAC: keyed-hashing for message authentication. URL
-
H. Krawczyk, M. Bellare, R. Canetti, HMAC: keyed-hashing for message authentication, 1997. URL https://tools.ietf.org/rfc/rfc2104.txt.
-
(1997)
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
74
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21:2 (1978), 120–126, 10.1145/359340.359342.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
75
-
-
84883406171
-
The impact of rank attack on network topology of routing protocol for low-power and lossy networks
-
Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., Chai, M., The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sens. J. 13:10 (2013), 3685–3692, 10.1109/JSEN.2013.2266399.
-
(2013)
IEEE Sens. J.
, vol.13
, Issue.10
, pp. 3685-3692
-
-
Le, A.1
Loo, J.2
Lasebae, A.3
Vinel, A.4
Chen, Y.5
Chai, M.6
-
76
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Hu, Y.-C., Perrig, A., Johnson, D.B., Ariadne: A secure on-demand routing protocol for ad hoc networks. Wirel. Netw. 11:1 (2005), 21–38.
-
(2005)
Wirel. Netw.
, vol.11
, Issue.1
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
77
-
-
49949111918
-
Intrusion detection of sinkhole attacks in wireless sensor networks
-
Kutyłowski M. Cichoń J. Kubiak P. Springer Berlin Heidelberg Berlin, Heidelberg
-
Krontiris, I., Dimitriou, T., Giannetsos, T., Mpasoukos, M., Intrusion detection of sinkhole attacks in wireless sensor networks. Kutyłowski, M., Cichoń, J., Kubiak, P., (eds.) Algorithmic Aspects of Wireless Sensor Networks: Third International Workshop, ALGOSENSORS 2007, Wroclaw, Poland, July 14, 2007, Revised Selected Papers, 2008, Springer Berlin Heidelberg, Berlin, Heidelberg, 150–161.
-
(2008)
Algorithmic Aspects of Wireless Sensor Networks: Third International Workshop, ALGOSENSORS 2007, Wroclaw, Poland, July 14, 2007, Revised Selected Papers
, pp. 150-161
-
-
Krontiris, I.1
Dimitriou, T.2
Giannetsos, T.3
Mpasoukos, M.4
-
78
-
-
84983212557
-
Detection of sinkhole attack in wireless sensor network
-
Satapathy S.C. Raju K.S. Mandal J.K. Bhateja V. Springer India New Delhi
-
Raju, I., Parwekar, P., Detection of sinkhole attack in wireless sensor network. Satapathy, S.C., Raju, K.S., Mandal, J.K., Bhateja, V., (eds.) Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 3, 2016, Springer India, New Delhi, 629–636.
-
(2016)
Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 3
, pp. 629-636
-
-
Raju, I.1
Parwekar, P.2
-
79
-
-
42549138436
-
On the intruder detection for sinkhole attack in wireless sensor networks
-
Ngai, E.C.H., Liu, J., Lyu, M.R., On the intruder detection for sinkhole attack in wireless sensor networks. 2006 IEEE International Conference on Communications, vol. 8, 2006, 3383–3389, 10.1109/ICC.2006.255595.
-
(2006)
2006 IEEE International Conference on Communications, vol. 8
, pp. 3383-3389
-
-
Ngai, E.C.H.1
Liu, J.2
Lyu, M.R.3
-
80
-
-
33845916834
-
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
-
Poovendran, R., Lazos, L., A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wirel. Netw. 13:1 (2007), 27–59, 10.1007/s11276-006-3723-x.
-
(2007)
Wirel. Netw.
, vol.13
, Issue.1
, pp. 27-59
-
-
Poovendran, R.1
Lazos, L.2
-
81
-
-
84889004828
-
Detection of sinkhole attack in wireless sensor networks
-
Salehi, S.A., Razzaque, M.A., Naraei, P., Farrokhtala, A., Detection of sinkhole attack in wireless sensor networks. 2013 IEEE International Conference on Space Science and Communication (IconSpace), 2013, 361–365, 10.1109/IconSpace.2013.6599496.
-
(2013)
2013 IEEE International Conference on Space Science and Communication (IconSpace)
, pp. 361-365
-
-
Salehi, S.A.1
Razzaque, M.A.2
Naraei, P.3
Farrokhtala, A.4
-
82
-
-
77951114599
-
Detecting Sinkhole attacks in wireless sensor networks
-
ICCAS-SICE, 2009
-
C. Tumrongwittayapak, R. Varakulsiripunth, Detecting Sinkhole attacks in wireless sensor networks, in: 2009 ICCAS-SICE, 2009, pp. 1966–1971.
-
(2009)
, pp. 1966-1971
-
-
Tumrongwittayapak, C.1
Varakulsiripunth, R.2
-
83
-
-
37149017489
-
A time-based key management protocol for wireless sensor networks
-
Springer-Verlag Berlin, Heidelberg
-
Jang, J., Kwon, T., Song, J., A time-based key management protocol for wireless sensor networks. Proceedings of the 3rd International Conference on Information Security Practice and Experience, ISPEC'07, 2007, Springer-Verlag, Berlin, Heidelberg, 314–328.
-
(2007)
Proceedings of the 3rd International Conference on Information Security Practice and Experience, ISPEC'07
, pp. 314-328
-
-
Jang, J.1
Kwon, T.2
Song, J.3
-
84
-
-
80052255404
-
Detection of sinkhole attack in wireless sensor networks using message digest algorithms
-
Sharmila, S., Umamaheswari, G., Detection of sinkhole attack in wireless sensor networks using message digest algorithms. 2011 International Conference on Process Automation, Control and Computing, 2011, 1–6, 10.1109/PACC.2011.5978973.
-
(2011)
2011 International Conference on Process Automation, Control and Computing
, pp. 1-6
-
-
Sharmila, S.1
Umamaheswari, G.2
-
85
-
-
33750285481
-
SybilGuard: defending against sybil attacks via social networks
-
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A., SybilGuard: defending against sybil attacks via social networks. SIGCOMM Comput. Commun. Rev. 36:4 (2006), 267–278, 10.1145/1151659.1159945.
-
(2006)
SIGCOMM Comput. Commun. Rev.
, vol.36
, Issue.4
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
86
-
-
84881224537
-
SoK: the evolution of sybil defense via social networks
-
IEEE Computer Society Washington, DC, USA
-
Alvisi, L., Clement, A., Epasto, A., Lattanzi, S., Panconesi, A., SoK: the evolution of sybil defense via social networks. Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP ’13, 2013, IEEE Computer Society, Washington, DC, USA, 382–396, 10.1109/SP.2013.33.
-
(2013)
Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP ’13
, pp. 382-396
-
-
Alvisi, L.1
Clement, A.2
Epasto, A.3
Lattanzi, S.4
Panconesi, A.5
-
87
-
-
84908438443
-
-
Duke Duke University, USA URL
-
Cao, Q., Yang, X., SeybilFence: Improving Social-Graph-Based Sybil Defenses with User Negative Feedback. Tech. Rep., 2012, Duke, Duke University, USA URL https://users.cs.duke.edu/~qiangcao/.
-
(2012)
SeybilFence: Improving Social-Graph-Based Sybil Defenses with User Negative Feedback. Tech. Rep.
-
-
Cao, Q.1
Yang, X.2
-
88
-
-
79960871268
-
Keep your friends close: incorporating trust into social network-based sybil defenses
-
Mohaisen, A., Hopper, N., Kim, Y., Keep your friends close: incorporating trust into social network-based sybil defenses. 2011 Proceedings IEEE INFOCOM, 2011, 1943–1951, 10.1109/INFCOM.2011.5934998.
-
(2011)
2011 Proceedings IEEE INFOCOM
, pp. 1943-1951
-
-
Mohaisen, A.1
Hopper, N.2
Kim, Y.3
-
89
-
-
77953317298
-
Sybil attacks against mobile users: Friends and foes to the rescue
-
IEEE Press Piscataway, NJ, USA URL
-
Quercia, D., Hailes, S., Sybil attacks against mobile users: Friends and foes to the rescue. Proceedings of the 29th Conference on Information Communications, INFOCOM'10, 2010, IEEE Press, Piscataway, NJ, USA, 336–340 URL http://dl.acm.org/citation.cfm?id=1833515.1833583.
-
(2010)
Proceedings of the 29th Conference on Information Communications, INFOCOM'10
, pp. 336-340
-
-
Quercia, D.1
Hailes, S.2
-
90
-
-
85042049215
-
-
- ip authentication header. URL, 4302
-
S. Kent, RFC 4302 - ip authentication header, 2005. URL https://tools.ietf.org/html/rfc4302.
-
(2005)
-
-
Kent, S.1
RFC2
-
91
-
-
85042031389
-
-
- IP Encapsulating Security Payload (ESP). URL, 4303
-
S. Kent, RFC 4303 - IP Encapsulating Security Payload (ESP), 2005. URL https://tools.ietf.org/html/rfc4303.
-
(2005)
-
-
Kent, S.1
RFC2
-
92
-
-
84884992599
-
-
SICS Lancaster University, UK URL
-
Raza, S., Chung, T., Duquennoy, S., Yazar, D., Voigt, T., Roedig, U., Securing Internet of Things with Lightweight IPsec, 2011, SICS, Lancaster University, UK URL http://soda.swedishict.se/4052/2/reportRevised.pdf.
-
(2011)
Securing Internet of Things with Lightweight IPsec
-
-
Raza, S.1
Chung, T.2
Duquennoy, S.3
Yazar, D.4
Voigt, T.5
Roedig, U.6
-
93
-
-
84911865485
-
Secure communication for the Internet of Things–a comparison of link-layer security and IPsec for 6LoWPAN
-
Raza, S., Duquennoy, S., Hglund, J., Roedig, U., Voigt, T., Secure communication for the Internet of Things–a comparison of link-layer security and IPsec for 6LoWPAN. Secur. Commun. Netw. 7:12 (2014), 2654–2668, 10.1002/sec.406.
-
(2014)
Secur. Commun. Netw.
, vol.7
, Issue.12
, pp. 2654-2668
-
-
Raza, S.1
Duquennoy, S.2
Hglund, J.3
Roedig, U.4
Voigt, T.5
-
94
-
-
85042049894
-
-
Compression Format for IPv6 Datagrams in 6LoWPAN Networks draft-ietf-6lowpan-hc-13. URL
-
J.W. Hui, P. Thubert, Compression Format for IPv6 Datagrams in 6LoWPAN Networks draft-ietf-6lowpan-hc-13, 2010. URL https://tools.ietf.org/html/draft-ietf-6lowpan-hc-13.
-
(2010)
-
-
Hui, J.W.1
Thubert, P.2
-
95
-
-
85042032122
-
-
Transmission of IPv6 Packets over IEEE 802.15.4 Networks. URL
-
G. Montenegro, N. Kushalnagar, J.W. Hui, D.E. Culler, Transmission of IPv6 Packets over IEEE 802.15.4 Networks, 2007. URL https://tools.ietf.org/html/rfc4944.
-
(2007)
-
-
Montenegro, G.1
Kushalnagar, N.2
Hui, J.W.3
Culler, D.E.4
-
96
-
-
84874293263
-
-
Kothmayr, T., Schmitt, C., Hu, W., Brnig, M., Carle, G., 37th Annual IEEE Conference on Local Computer Networks - Workshops, 2012, 956–963, 10.1109/LCNW.2012.6424088.
-
(2012)
37th Annual IEEE Conference on Local Computer Networks - Workshops
, pp. 956-963
-
-
Kothmayr, T.1
Schmitt, C.2
Hu, W.3
Brnig, M.4
Carle, G.5
-
97
-
-
84885304488
-
{DTLS} based security and two-way authentication for the Internet of Things
-
Kothmayr, T., Schmitt, C., Hu, W., Brnig, M., Carle, G., {DTLS} based security and two-way authentication for the Internet of Things. Ad Hoc Netw. 11:8 (2013), 2710–2723, 10.1016/j.adhoc.2013.05.003.
-
(2013)
Ad Hoc Netw.
, vol.11
, Issue.8
, pp. 2710-2723
-
-
Kothmayr, T.1
Schmitt, C.2
Hu, W.3
Brnig, M.4
Carle, G.5
-
98
-
-
85014149843
-
-
Newnes Newton, MA, USA
-
Kinney, S.L., Trusted Platform Module Basics: Using TPM in Embedded Systems, 2006, Newnes, Newton, MA, USA.
-
(2006)
Trusted Platform Module Basics: Using TPM in Embedded Systems
-
-
Kinney, S.L.1
-
99
-
-
84910634929
-
Robust multi-factor authentication for fragile communications
-
Huang, X., Xiang, Y., Bertino, E., Zhou, J., Xu, L., Robust multi-factor authentication for fragile communications. IEEE Trans. Dependable Secure Comput. 11:6 (2014), 568–581, 10.1109/TDSC.2013.2297110.
-
(2014)
IEEE Trans. Dependable Secure Comput.
, vol.11
, Issue.6
, pp. 568-581
-
-
Huang, X.1
Xiang, Y.2
Bertino, E.3
Zhou, J.4
Xu, L.5
-
100
-
-
84937151672
-
SMARTIE project: Secure IoT data management for smart cities
-
Bohli, J.M., Skarmeta, A., Moreno, M.V., Garca, D., Langendörfer, P., SMARTIE project: Secure IoT data management for smart cities. 2015 International Conference on Recent Advances in Internet of Things (RIoT), 2015, 1–6, 10.1109/RIOT.2015.7104906.
-
(2015)
2015 International Conference on Recent Advances in Internet of Things (RIoT)
, pp. 1-6
-
-
Bohli, J.M.1
Skarmeta, A.2
Moreno, M.V.3
Garca, D.4
Langendörfer, P.5
-
101
-
-
84928596525
-
An overview of fog computing and its security issues
-
Stojmenovic, I., Wen, S., Huang, X., Luan, H., An overview of fog computing and its security issues. Concurr. Comput. Pract. Exp. 28:10 (2016), 2991–3005, 10.1002/cpe.3485.
-
(2016)
Concurr. Comput. Pract. Exp.
, vol.28
, Issue.10
, pp. 2991-3005
-
-
Stojmenovic, I.1
Wen, S.2
Huang, X.3
Luan, H.4
-
102
-
-
85026500515
-
Secure CoAP using enhanced DTLS for Internet of Things
-
Chavan, A.A., Nighot, M.K., Secure CoAP using enhanced DTLS for Internet of Things. Internat. J. Innovative Res. Comput. Commun. Eng. 2:12 (2014), 7601–7608.
-
(2014)
Internat. J. Innovative Res. Comput. Commun. Eng.
, vol.2
, Issue.12
, pp. 7601-7608
-
-
Chavan, A.A.1
Nighot, M.K.2
-
103
-
-
84864199559
-
6LoWPAN compressed DTLS for CoAP
-
Raza, S., Trabalza, D., Voigt, T., 6LoWPAN compressed DTLS for CoAP. 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012, 287–289, 10.1109/DCOSS.2012.55.
-
(2012)
2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems
, pp. 287-289
-
-
Raza, S.1
Trabalza, D.2
Voigt, T.3
-
104
-
-
84912047576
-
RERUM: Building a reliable IoT upon privacy- and security- enabled smart objects
-
Phls, H.C., Angelakis, V., Suppan, S., Fischer, K., Oikonomou, G., Tragos, E.Z., Rodriguez, R.D., Mouroutis, T., RERUM: Building a reliable IoT upon privacy- and security- enabled smart objects. 2014 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), 2014, 122–127, 10.1109/WCNCW.2014.6934872.
-
(2014)
2014 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)
, pp. 122-127
-
-
Phls, H.C.1
Angelakis, V.2
Suppan, S.3
Fischer, K.4
Oikonomou, G.5
Tragos, E.Z.6
Rodriguez, R.D.7
Mouroutis, T.8
-
105
-
-
85042052002
-
-
BUTLER-Consortium, BUTLER smartlife –uBiquitous, secUre inTernet-of-things with Location and contExt-awaReness. URL
-
BUTLER-Consortium, BUTLER smartlife –uBiquitous, secUre inTernet-of-things with Location and contExt-awaReness, 2014. URL http://cordis.europa.eu/docs/projects/cnect/1/287901/080/deliverables/001-287901BUTLERD25.pdf.
-
(2014)
-
-
-
106
-
-
84896743669
-
Tailoring end-to-end IP security protocols to the Internet of Things
-
Hummen, R., Wirtz, H., Ziegeldorf, J.H., Hiller, J., Wehrle, K., Tailoring end-to-end IP security protocols to the Internet of Things. 2013 21st IEEE International Conference on Network Protocols (ICNP), 2013, 1–10, 10.1109/ICNP.2013.6733571.
-
(2013)
2013 21st IEEE International Conference on Network Protocols (ICNP)
, pp. 1-10
-
-
Hummen, R.1
Wirtz, H.2
Ziegeldorf, J.H.3
Hiller, J.4
Wehrle, K.5
-
107
-
-
85015236940
-
ARMOUR: Large-scale experiments for IoT security trust
-
Prez, S., Martnez, J.A., Skarmeta, A.F., Mateus, M., Almeida, B., Mal, P., ARMOUR: Large-scale experiments for IoT security trust. 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016, 553–558, 10.1109/WF-IoT.2016.7845504.
-
(2016)
2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)
, pp. 553-558
-
-
Prez, S.1
Martnez, J.A.2
Skarmeta, A.F.3
Mateus, M.4
Almeida, B.5
Mal, P.6
-
108
-
-
84940038928
-
Security considerations around end-to-end security in the IP-based Internet of Things
-
Brachmann, M., Garcia-Morchon, O., Keoh, S.-L., Kumar, S.S., Security considerations around end-to-end security in the IP-based Internet of Things. 2012 Workshop on Smart Object Security, in Conjunction with IETF83, 2012, 1–3.
-
(2012)
2012 Workshop on Smart Object Security, in Conjunction with IETF83
, pp. 1-3
-
-
Brachmann, M.1
Garcia-Morchon, O.2
Keoh, S.-L.3
Kumar, S.S.4
-
109
-
-
84889100209
-
Otsopack: Lightweight semantic framework for interoperable ambient intelligence applications
-
Gmez-Goiri, A., Ordua, P., Diego, J., de Ipiña, D.L., Otsopack: Lightweight semantic framework for interoperable ambient intelligence applications. Comput. Hum. Behav. 30:Suppl. C (2014), 460–467, 10.1016/j.chb.2013.06.022.
-
(2014)
Comput. Hum. Behav.
, vol.30
, pp. 460-467
-
-
Gmez-Goiri, A.1
Ordua, P.2
Diego, J.3
de Ipiña, D.L.4
-
110
-
-
85042004642
-
-
OneM2M, Security solutions –OneM2M Technical Specification. URL
-
OneM2M, Security solutions –OneM2M Technical Specification, 2017. URL http://onem2m.org/technical/latest-drafts.
-
(2017)
-
-
-
111
-
-
84906657543
-
Proposal of a secure, deployable and transparent middleware for Internet of Things
-
Ferreira, H.G.C., de Sousa, R.T., de Deus, F.E.G., Canedo, E.D., Proposal of a secure, deployable and transparent middleware for Internet of Things. 2014 9th Iberian Conference on Information Systems and Technologies, CISTI, 2014, 1–4, 10.1109/CISTI.2014.6877069.
-
(2014)
2014 9th Iberian Conference on Information Systems and Technologies, CISTI
, pp. 1-4
-
-
Ferreira, H.G.C.1
de Sousa, R.T.2
de Deus, F.E.G.3
Canedo, E.D.4
-
113
-
-
85042006305
-
-
The-Bitcoin-Foundation, How does Bitcoin work?. URL
-
The-Bitcoin-Foundation, How does Bitcoin work?, 2014. URL https://bitcoin.org/en/how-it-works.
-
(2014)
-
-
-
114
-
-
85042060416
-
-
BitInfoCharts, Block - Bitcoin Wiki. URL
-
BitInfoCharts, Block - Bitcoin Wiki, 2016. URL https://en.bitcoin.it/wiki/Block.
-
(2016)
-
-
-
115
-
-
85042057117
-
-
EtherScan, Ethereum Average BlockTime Chart. URL
-
EtherScan, Ethereum Average BlockTime Chart, 2016. URL https://etherscan.io/chart/blocktime.
-
(2016)
-
-
-
116
-
-
85042025993
-
-
Linux-Foundation, Blockchain technologies for business. URL
-
Linux-Foundation, Blockchain technologies for business, 2017. URL https://www.hyperledger.org/.
-
(2017)
-
-
-
117
-
-
85042015799
-
-
What is eris? 2016 Edition. URL
-
C. Kuhlman, What is eris? 2016 Edition, 2016. URL https://monax.io/2016/04/03/wtf-is-eris/.
-
(2016)
-
-
Kuhlman, C.1
-
118
-
-
85042039416
-
-
Stellar, Stellar network overview. URL
-
Stellar, Stellar network overview, 2014. URL https://www.stellar.org/developers/guides/get-started/.
-
(2014)
-
-
-
119
-
-
85042052918
-
-
Ripple, Ripple network. URL
-
Ripple, Ripple network, 2013. URL https://ripple.com/network.
-
(2013)
-
-
-
120
-
-
85042056631
-
-
All-In-Bits, Introduction to tendermint. URL
-
All-In-Bits, Introduction to tendermint, 2017. URL https://tendermint.com/intro.
-
(2017)
-
-
-
121
-
-
85031688484
-
The blockchain phenomenon: The disruptive potential of distributed consensu architectures
-
Research Institute of the Finnish Economy URL
-
Mattila, J., The blockchain phenomenon: The disruptive potential of distributed consensu architectures. ETLA working papers: Elinkeinoelämän Tutkimuslaitos, 2016, Research Institute of the Finnish Economy URL https://books.google.com.pk/books?id=StNQnQAACAAJ.
-
(2016)
ETLA working papers: Elinkeinoelämän Tutkimuslaitos
-
-
Mattila, J.1
-
122
-
-
85042034441
-
-
EconoTimes, Safeshare releases first blockchain insurance solution for sharing economy. URL
-
EconoTimes, Safeshare releases first blockchain insurance solution for sharing economy, 2016. URL https://www.econotimes.com/SafeShare-Releases-First-Blockchain-Insurance-Solution-For-Sharing-Economy-181326.
-
(2016)
-
-
-
123
-
-
85042045405
-
-
IBM blockchain based on hyperledger fabric from the linux foundation. URL
-
IBM, IBM blockchain based on hyperledger fabric from the linux foundation, 2017. URL https://www.ibm.com/blockchain/hyperledger.html.
-
(2017)
-
-
IBM1
-
124
-
-
84900465745
-
Challenges from the Identities of Things: Introduction of the Identities of Things discussion group within Kantara initiative
-
Friese, I., Heuer, J., Kong, N., Challenges from the Identities of Things: Introduction of the Identities of Things discussion group within Kantara initiative. 2014 IEEE World Forum on Internet of Things (WF-IoT), 2014, 1–4, 10.1109/WF-IoT.2014.6803106.
-
(2014)
2014 IEEE World Forum on Internet of Things (WF-IoT)
, pp. 1-4
-
-
Friese, I.1
Heuer, J.2
Kong, N.3
-
125
-
-
85029432760
-
TrustChain: A Sybil-resistant scalable blockchain
-
Otte, P., de Vos, M., Pouwelse, J., TrustChain: A Sybil-resistant scalable blockchain. Future Gener. Comput. Syst., 2017, 10.1016/j.future.2017.08.048.
-
(2017)
Future Gener. Comput. Syst.
-
-
Otte, P.1
de Vos, M.2
Pouwelse, J.3
-
126
-
-
85029375018
-
Blockchain for the Internet of Things: A systematic literature Review
-
The 3rd International Symposium on Internet of Things: Systems, Management, and Security, IOTSMS-2016.
-
M. Conoscenti, A. Vetro, J.C.D. Martin, Blockchain for the Internet of Things: A systematic literature Review, in: The 3rd International Symposium on Internet of Things: Systems, Management, and Security, IOTSMS-2016, 2016.
-
(2016)
-
-
Conoscenti, M.1
Vetro, A.2
Martin, J.C.D.3
-
127
-
-
85042022047
-
-
Enigma: decentralized computation platform with guaranteed privacy. URL
-
G. Zyskind, O. Nathan, A. Pentland, Enigma: decentralized computation platform with guaranteed privacy, 2015. URL http://enigma.media.mit.edu/enigma~full.pdf.
-
(2015)
-
-
Zyskind, G.1
Nathan, O.2
Pentland, A.3
-
128
-
-
84928480750
-
An IoT electric business model based on the protocol of bitcoin
-
Zhang, Y., Wen, J., An IoT electric business model based on the protocol of bitcoin. 2015 18th International Conference on Intelligence in Next Generation Networks, 2015, 184–191, 10.1109/ICIN.2015.7073830.
-
(2015)
2015 18th International Conference on Intelligence in Next Generation Networks
, pp. 184-191
-
-
Zhang, Y.1
Wen, J.2
-
129
-
-
84908674721
-
When your sensor earns money: Exchanging data for cash with bitcoin
-
ACM New York, NY, USA
-
Wörner, D., von Bomhard, T., When your sensor earns money: Exchanging data for cash with bitcoin. Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, UbiComp ’14 Adjunct, 2014, ACM, New York, NY, USA, 295–298, 10.1145/2638728.2638786.
-
(2014)
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, UbiComp ’14 Adjunct
, pp. 295-298
-
-
Wörner, D.1
von Bomhard, T.2
-
130
-
-
85042020138
-
-
Privacy-awareness in Blockchain-based PKI, Tech. Rep. 2015. URL
-
L. Axon, Privacy-awareness in Blockchain-based PKI, Tech. Rep. 2015. URL https://ora.ox.ac.uk/objects/uuid:f8377b69-599b-4cae-8df0-f0cded53e63b/datastreams/ATTACHMENT01.
-
-
-
Axon, L.1
-
131
-
-
85042054706
-
-
CertCoin: A namecoin based decentralized authentication system. URL
-
C. Fromknecht, D. Velicanu, S. Yakoubov, CertCoin: A namecoin based decentralized authentication system, 2014. URL https://courses.csail.mit.edu/6.857/2014/files/19-fromknecht-velicann-yakoubov-certcoin.pdf.
-
(2014)
-
-
Fromknecht, C.1
Velicanu, D.2
Yakoubov, S.3
-
132
-
-
85042051360
-
-
Blockchain platform for industrial Internet of Things, Tech. Rep. 2016. URL
-
A. Bahga, V.K. Madisetti, Blockchain platform for industrial Internet of Things, Tech. Rep. 2016. URL http://file.scirp.org/pdf/JSEA_2016102814012798.pdf.
-
-
-
Bahga, A.1
Madisetti, V.K.2
-
133
-
-
84979828304
-
Blockchains and smart contracts for the Internet of Things
-
Christidis, K., Devetsikiotis, M., Blockchains and smart contracts for the Internet of Things. IEEE Access 4 (2016), 2292–2303, 10.1109/ACCESS.2016.2566339.
-
(2016)
IEEE Access
, vol.4
, pp. 2292-2303
-
-
Christidis, K.1
Devetsikiotis, M.2
-
135
-
-
84933042177
-
Wireless energy harvesting for the Internet of Things
-
Kamalinejad, P., Mahapatra, C., Sheng, Z., Mirabbasi, S., Leung, V.C.M., Guan, Y.L., Wireless energy harvesting for the Internet of Things. IEEE Commun. Mag. 53:6 (2015), 102–108, 10.1109/MCOM.2015.7120024.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.6
, pp. 102-108
-
-
Kamalinejad, P.1
Mahapatra, C.2
Sheng, Z.3
Mirabbasi, S.4
Leung, V.C.M.5
Guan, Y.L.6
-
136
-
-
85029448653
-
A survey on the security of blockchain systems
-
Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q., A survey on the security of blockchain systems. Future Gener. Comput. Syst., 2017, 10.1016/j.future.2017.08.020.
-
(2017)
Future Gener. Comput. Syst.
-
-
Li, X.1
Jiang, P.2
Chen, T.3
Luo, X.4
Wen, Q.5
|