1 |
K. Zhao and L. Ge, "A survey on the internet of things security," in Computational Intelligence and Security (CIS), 2013 9th International Conference on, 2013, pp. 663-667, 2013.
|
2 |
A. Banks and R. Gupta, "MQTT Version 3.1.1," OASIS Standard, 2014.
|
3 |
E. Rescorla, SSL and TLS: Designing and Building Secure Systems. Addison-Wesley Reading, 2001.
|
4 |
IoT Forum, "The Classification and Security Requirements based on IoT Device Capabilities," IoTFS-0081, 12.1, 2015.
|
5 |
T. Dierks, "The transport layer security (TLS) protocol version 1.2," 2008.
|
6 |
J. Yen and R. Langari, Fuzzy Logic: Intelligence, Control, and Information. Prentice-Hall, Inc., 1998.
|
7 |
R. Babuska, "Fuzzy Systems, Modeling and Identification," Delft University of Technology, Department of Electrical Engineering Control Laboratory, Mekelweg, vol. 4, 1996.
|
8 |
N. R. Potlapally, S. Ravi, A. Raghunathan and N. K. Jha, "A study of the energy consumption characteristics of cryptographic algorithms and security protocols," Mobile Computing, IEEE Transactions on, vol. 5, pp. 128-143, 2006.
DOI
|
9 |
R. Karri and P. Mishra, "Minimizing energy consumption of secure wireless session with QoS constraints," in Communications, 2002. ICC 2002. IEEE International Conference on, 2002, pp. 2053-2057, 2002.
|