1 |
G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, "Transmission of IPv6 Packets over IEEE 802.15.4 Networks," IETF RFC 4944, Sep. 2007.
|
2 |
J. Hui and P. Thubert, "Compression Format for IPv6 Datagrams over IEEE 802.15.4-based Networks," IETF RFC 6282, Sep. 2011.
|
3 |
S. Misra, S. Goswam, C. Taneja, A. Mukerjee, and M. Obaidat, "A PKI Adapted Model for Secure Information Dissemination in Industrial Control and Automation 6LoWPANs," IEEE Access, vol. 3, pp. 875-889, 2015
DOI
|
4 |
Y. Qiu and M. Ma, "A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks," IEEE Trans. on Industrial Informatics, vol. 12, no. 6, pp. 2074-2085, Dec. 2016.
DOI
|
5 |
Certicom Research, "SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV)," Standard for Efficient Cryptography, Jan. 2013.
|
6 |
P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, "PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications," International Journal of Distributed Sensor Networks, vol. 2014, Article ID 357430.
|
7 |
C. S. Park, "A Secure and Efficient ECQV Implicit Certificate Issuance Protocol for the Internet of Things Applications," IEEE Sensors Journal, vol. 17, no. 7, pp. 2215-2223, Apr. 2017
DOI
|
8 |
L. Oliveira, J. Rodrigues, A. Sousa, and V. Denisov, "Network Admission Control Solution for 6LoWPAN Networks Based on Symmetric Key Mechanisms," IEEE Trans. on Industrial Informatics, vol. 12, no. 6, pp. 2186-2195, Dec. 2016.
DOI
|
9 |
L. Eschenauer and V. Gligor, "A Key Management Scheme for Distributed Sensor Networks," in Proc. of 9th ACM conference on Computer and Communications Security (ACM-CCS), pp. 41-47, Washington D.C., U.S.A., Nov. 18-22, 2002.
|
10 |
H. Chan, A. Perrig, and D. Song, "Random Key Pre-distribution Schemes for Sensor Networks", in Proc. of the IEEE Symposium on Security and Privacy, 2003, pp. 197-213, Washington D.C., U.S.A., May 11-14, 2003.
|
11 |
L. Seitz, S. Gerdes, G. Selander, M. Mani, and S. Kumar, "Use Cases for Authentication and Authorization in Constrained Environments," IETF RFC 7744, Jan. 2016.
|
12 |
A. Esfahani, G. Mantas, R. Matischek, F. B. Saghezchi, J. Rodriguez, A. Bicaku, S. Maksuti, M. Tauber, C. Schmittner, and J. Bastos, "A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment," IEEE Internet of Things Journal, 2017.
|
13 |
Z. Shelby, S. Chakrabarti, E. Nordmark, and C. Bormann, "Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)," IETF RFC 6775, Nov. 2012.
|
14 |
J. Nieminen, T. Savolainen, M. Isomaki, B. Patil, Z. Shelby, and C. Gomez, "IPv6 over Bluetooth Low Energy," IETF RFC 7668, Oct. 2015.
|
15 |
M.A.M. Seliem, K.M.F. Elsayed, and A Kattab, "Optimized Neighbor Discovery for 6LoWPANs: Implementation and Performance Evaluation," Computer Communications, vol. 112, pp. 73-92, Nov. 2017.
DOI
|
16 |
C. S. Park and J. H. Lee, "Security Bootstrapping for Secure Join and Binding on the IEEE 802.15.4-Based LoWPAN," IEEE Internet of Things Journal, vol. 4, no. 4, pp. 996-1005, May. 2017.
DOI
|
17 |
J. Arkko, J. Kempf, B. Zill, and P. Nikander, "Secure Neighbor Discovery," IETF RFC 3971, Mar. 2005.
|
18 |
P. Thubert, B. Sarikaya, and M. Sethi, "Address Protected Neighbor Discovery for Low-power and Lossy Networks," IETF 6lo WG Internet-Draft, draft-ietf-6lo-ap-nd-06, Feb. 2018.
|