1 |
Dave Evans, "The Internet of Things: How the Next Evolution of the Internet Is Changing Everything", Cisco IBSG, April 2011.
|
2 |
H.Tschofenig, "The OAuth 2.0 Internet of Things (IoT) Client Credentials Grant", draft-tschofenig-ace-oauth-iot-00.txt, July 2014
|
3 |
E. Hammer-Lahav, "The Oath 1.0 Protocol", IETF, RFC5849, April 2010.
|
4 |
D. Hart, "The Oath 2.0 Authorization Framework", IETF, RFC6749, October 2012.
|
5 |
Simone Cirani, Macro Picone, "IoT-OAS : An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios", IEEE SENSORS JOURNAL, VOL. 15, 2015. DOI: http://dx.doi.org/10.1109/JSEN.2014.2361406
|
6 |
Schmitt and B.Stiller, "DTLS-based security with two-way Authentication for IoT-02", Internet Draft, draft-schmitt-two-way-authentication-for-iot-02, February 2014.
|
7 |
Z.Shelby, K.Hartke and C.Borman, "Constrained Application Protocol (CoAP)", RFC7252, IETF, draft-ietf-core-18, June 2013.
|
8 |
Rescolrla and N.Modadugu, "Datagram Transport Layer Security Version 1.2", RFC6347, IETF, January 2012.
|