1 |
J. Park and N. Kang, "Entity authentication scheme for secure WEB of things applications," J. KICS, vol. 38B, no. 05, pp. 394-400, May 2013.
DOI
|
2 |
E. Rescorla and N. Modadugu, Datagram Transport Layer Security Version 1.2, IETF RFC 6347, Jan. 2012.
|
3 |
J. Park, S. Shin, and N. Kang, "Mutual authentication and key agreement scheme between lightweight devices in internet of things," J. KICS, vol. 38B, no. 09, pp. 707-714, Sept. 2013.
DOI
|
4 |
T. Dierks and E. Rescorla, The Transport Layer Security Protocol Version 1.2, IETF RFC 5246, Aug. 2008.
|
5 |
M.-H. Park, C.-K. Lee, J.-H. Son, and S.-W. Seo, "Efficient security mechanism using light-weight data origin authentication in sensor network," J. KICS, vol. 32, no. 05, pp. 402-408, May 2007.
|
6 |
Y. Hu, A. Perrig, and D. B. Johnson, "Efficient security mechanisms for routing protocols," in Proc. NDSS'03, Feb. 2003.
|
7 |
D. Eastlake and P. Jones, US Secure Hash Algorithm 1(SHA1), IETF RFC 3174, Sept. 2001.
|
8 |
F. Dotzer, "Privacy issues in vehicular ad hoc networks," in Proc. 2nd ACM Int. Workshop Veh. Ad Hoc Netw., Sept. 2005.
|
9 |
H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message Authentication, IETF RFC 2104, Feb 1997.
|
10 |
I. Ishaq, D. Carels, G. Teklemariam, J. Hoebeke, F. Abeele, E. Poorter, I. Moerman, and P. Demeester, "IETF standardization in the field of the internet of things (IoT): A survey," J. Sensor and Actuator Networks, vol. 2, no. 2, pp. 235-287, Apr. 2013.
DOI
|
11 |
H. R. Lee, K.-H. Jung, and Y.-J. Suh, "Contention/Collision mitigation scheme in IEEE 802.15.4 mesh sensor networks," J. KICS, vo1. 38C, no. 08, pp. 683-691, Sept. 2013.
DOI
|