DTLS based security and two-way authentication for the Internet of Things
Top Cited Papers
- 1 November 2013
- journal article
- Published by Elsevier BV in Ad Hoc Networks
- Vol. 11 (8), 2710-2723
- https://doi.org/10.1016/j.adhoc.2013.05.003
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- The Constrained Application Protocol (CoAP)Published by RFC Editor ,2014
- A DTLS based end-to-end security architecture for the Internet of Things with two-way authenticationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Opal: A Multiradio Platform for High Throughput Wireless Sensor NetworksIEEE Embedded Systems Letters, 2011
- Toward trusted wireless sensor networksACM Transactions on Sensor Networks, 2010
- TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Denial-of-Service in Wireless Sensor Networks: Attacks and DefensesIEEE Pervasive Computing, 2008
- Mitigating DoS attacks against broadcast authentication in wireless sensor networksACM Transactions on Sensor Networks, 2008
- Energy Evaluation of Software Implementations of Block Ciphers under Memory ConstraintsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- MiniSecPublished by Association for Computing Machinery (ACM) ,2007
- Sizzle: A standards-based end-to-end security architecture for the embedded InternetPervasive and Mobile Computing, 2005