1 |
IEEE std. 802.15.4-2015, Part 15.4:Low-Rate WPANs, pp. 87-92, Dec, 2015.
|
2 |
S. Sciancalepore, S. G. Piro, E. Vogli, G. Boggia, and L. A. Grieco, "On Securing IEEE 802.15.4 Networks through a Standard Compliant Framework," In Proc. of the 2014 Euro Med Telco Conference, pp. 1-6, Naples, Nov. 12-15, 2014.
|
3 |
Certicom Research, "Standard for Efficient Cryptography," SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Version 0.97. pp. 5-12, Aug, 2013.
|
4 |
P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, "PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications," International Journal of Distributed Sensor Networks, vol. 2014, Article ID 357430.
|
5 |
G. Piro, G. Boggia, and L.A. Grieco, "A Standard Compliant Security Framework for IEEE 802.15.4 Networks," in Proc. of the IEEE World Forum on Internet of Things, pp. 27-30, Seoul, Mar. 6-8, 2014.
|
6 |
Certicom Research, "Standard for Efficient Cryptography," SEC 1: Elliptic Curve Cryptography Version 2.0. pp. 15-21, May 21, 2009.
|
7 |
S. Sciancalepore, A. Capossele, G. Piro, G. Boggia, and G. Bianchi, "Key Management Protocol with Implicit Certificates for IoT systems," In Proc. of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, pp. 37-42, Florence, May 18-22, 2015.
|
8 |
Instrument and Technology, "K-mote Data sheet," pp. 7-8, Oct 5, 2008.
|
9 |
C. Lederer, R. Mader, M. Koschuch, J. Grossschadl, A. Szekely, and S. Tillich, "Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks," in Information Security Theory and Practice - WISTP 2009, LNCS, vol. 5746. Springer Verlag, pp. 112-127, 2009.
|