1 |
Chen, Min, et al. "Body area networks: A survey." Mobile networks and applications 16.2 (2011): 171-193.
DOI
|
2 |
M.R. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L.A. Grieco, G. Boggia, M. Dohler, "Standardized Protocol Stack For The Internet Of (Important) Things," IEEE Commun. Surveys and Tutorials, DOI 10.1109/SURV.2012.111412.00158.
DOI
|
3 |
M.R. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L.A. Grieco, G. Boggia, M. Dohler, "Standardized Protocol Stack For The Internet Of (Important) Things," IEEE Commun. Surveys and Tutorials, DOI 10.1109/SURV.2012.111412.00158.
DOI
|
4 |
G. Wu et al., "M2M: From mobile to embedded internet," IEEE Commun. Mag., vol. 49, no. 4, pp. 36-43, Apr. 2011.
DOI
|
5 |
Digi International Inc. (2011) Connectport(R) X2 for Smart Energy. [Online]. Available: http://www.digi.com/products/wireless-routers-gateways/gateways/
|
6 |
IEEE 802.15 Task Group 4, http://www.ieee802.org/15/pub/TG4.html
|
7 |
IEEE 802 working group, Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), IEEE Computer Society, Standard specification, [WWW], http://standards.ieee.org/getieee802/ download/ 802.15.4-2006.pdf
|
8 |
A UDP/IP Adaptation of the ZigBee Application Protocol, G. Tolle, October 8 2008, [WWW], http://tools.ietf.org/html/draft-tolle-cap-00
|
9 |
P. Kasinathan, C. Pastrone, M. A. Spirito, and M. Vinkovits, "Denial-ofService detection in 6LoWPAN based Internet of Things," Proceedings of 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2013, pp. 600- 607.
|
10 |
Y. Zhou, Z. Jia, X. Sun, X. Li, and L. Ju, "Design of embedded secure gateway based on 6LoWPAN," Proceedings of 2011 IEEE 13th International Conference on Communication Technology (ICCT), 2011, pp. 732-736.
|
11 |
S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt, and U. Roedig, "Securing communication in 6LoWPAN with compressed IPsec," Proceedings of 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011, pp. 1-8
|
12 |
H. R. Hussen, G. A. Tizazu, T. Miao, L. Taekkyeun, C. Youngjun, and K. Ki-Hyung, "SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN)," Proceedings of 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN), 2013, pp. 246-251.
|
13 |
L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Computer Networks, vol. 54, no. 15, pp. 2787-2805, 2010. [Online]. Available: http://www.sciencedirect.com/ science/article/pii/S1389128610001568
DOI
|
14 |
E. Fasolo, M. Rossi, J. Widmer, and M. Zorzi, "In-network aggregation techniques for wireless sensor networks: a survey," Wireless Communications, IEEE, vol. 14, no. 2, pp. 70-87, April 2007.
|
15 |
A. Dimakis, P. Godfrey, Y. Wu, M. Wainwright, and K. Ramchandran, "Network coding for distributed storage systems," Information Theory, IEEE Transactions on, vol. 56, no. 9, pp. 4539-4551, Sept 2010.
DOI
|