1 |
Shelby, Zach, Klaus Hartke, and Carsten Bormann, "The constrained application protocol (CoAP)," No. RFC 7252, 2014.
|
2 |
Granjal, Jorge, Edmundo Monteiro, and Jorge Sa Silva, "Security in the integration of low-power wireless sensor networks with the internet: A survey," Ad Hoc Networks 24, pp. 264-297, 2015.
DOI
|
3 |
Roman, Rodrigo, Pablo Najera, and Javier Lopez, "Securing the internet of things," Computer 44.9, pp. 51-59, 2011.
DOI
|
4 |
IEEE Computer Society. IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), 2006.
|
5 |
Kushalnagar, Nandakishore, Gabriel Montenegro, and Christian Schumacher, "IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals," No. RFC 4919, 2007.
|
6 |
Winter, Tim, "RPL: IPv6 routing protocol for low-power and lossy networks," 2012.
|
7 |
Hummen, R., Shafagh, H., Raza, S., Voig, T., & Wehrle, K, "Delegation-based Authentication and Authorization for the IP-based Internet of Things," 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), IEEE, pp. 284-292, 2014.
|
8 |
dos Santos, G. L., da Cunha Rodrigues, G., Granville, L. Z., & Tarouco, L. M. R, "A DTLS-based security architecture for the Internet of Things," 2015 IEEE Symposium on Computers and Communication (ISCC), IEEE, pp. 809-815, 2015.
|
9 |
권혁진, and 강남희, "사물인터넷에서 경량화 장치 간 DTLS 세션 설정 시 에너지 소비량 분석," 한국통신학회논문지 40.8, pp. 1588-1596, 2015.
DOI
|