Sizzle: A standards-based end-to-end security architecture for the embedded Internet, Pervasive and Mobile Computing, vol.1, issue.4, pp.425-445, 2005. ,
DOI : 10.1016/j.pmcj.2005.08.005
Lithe: Lightweight Secure CoAP for the Internet of Things, IEEE Sensors Journal, vol.13, issue.10, pp.3711-3720, 2013. ,
DOI : 10.1109/JSEN.2013.2277656
Securing communication in 6LoWPAN with compressed IPsec, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), pp.1-8, 2011. ,
DOI : 10.1109/DCOSS.2011.5982177
6LoWPAN Compressed DTLS for CoAP, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, pp.287-289, 2012. ,
DOI : 10.1109/DCOSS.2012.55
Constrained Application Protocol (CoAP) draft-ietf-core-coap-18, IETF work in progress, 2013. ,
DOI : 10.17487/rfc7252
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.467.9288
Architectural styles and the design of network-based software architectures, pp.76-106, 2000. ,
Networking named content, Emerging networking experiments and technologies, pp.1-12, 2009. ,
DOI : 10.1145/1658939.1658941
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.190.4930
A data-oriented (and beyond) network architecture, ACM SIGCOMM Computer Communication Review, vol.37, issue.4, pp.181-192, 2007. ,
DOI : 10.1145/1282427.1282402
Securing network content, 2009. ,
The design and implementation of datagram TLS, Proceedings of ISOC NDSS, 2004. ,
SenShare: Transforming Sensor Networks into Multi-application Sensing Infrastructures, Wireless Sensor Networks, pp.65-81, 2012. ,
DOI : 10.1016/j.comnet.2008.04.002
102 691 V1. 1.1 Machine-to-Machine communications (M2M), " Smart Metering Use Cases, 2011. ,
A database in every sensor, Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems, SenSys '11, pp.316-332, 2011. ,
DOI : 10.1145/2070942.2070974
Privacy preserving cloud data access with multi-authorities, 2013 Proceedings IEEE INFOCOM, 2013. ,
DOI : 10.1109/INFCOM.2013.6567070
DTLS-based Multicast Security for Low-Power and Lossy Networks (LLNs) draft-keoh-dice-multicast-security-05, IETF work in progress, 2014. ,
A novel batch-based group key management protocol applied to the Internet of Things, Ad Hoc Networks, pp.2724-2737, 2013. ,
DOI : 10.1016/j.adhoc.2013.05.009
Towards viable certificate-based authentication for the internet of things, Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy, HotWiSec '13 ,
DOI : 10.1145/2463183.2463193
Practical Issues with Datagram Transport Layer Security in Constrained Environments draft-hartke-dice-practical-issues-00, IETF work in progress, 2013. ,
Energy Cost of Security in an Energy-Harvested IEEE 802.15.4 Wireless Sensor Network, 2014. ,
MiniSec, Proceedings of the 6th international conference on Information processing in sensor networks , IPSN '07, p.479, 2007. ,
DOI : 10.1145/1236360.1236421
Why is IPSec a viable option for wireless sensor networks, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp.802-807, 2008. ,
DOI : 10.1109/MAHSS.2008.4660130
Integrating wireless sensor networks and the internet: a security analysis, Internet Research, vol.19, issue.2, 2009. ,
DOI : 10.1108/10662240910952373
A secure interconnection model for IPv6 enabled wireless sensor networks, 2010 IFIP Wireless Days, 2010. ,
DOI : 10.1109/WD.2010.5657743
Secure communication for the Internet of Things-a comparison of link-layer security and IPsec for 6LoWPAN, Security and Communication Networks, vol.19, issue.2, 2012. ,
DOI : 10.1002/sec.406
On the Effectiveness of End-to-End Security for Internet-Integrated Sensing Applications, 2012 IEEE International Conference on Green Computing and Communications, pp.87-93, 2012. ,
DOI : 10.1109/GreenCom.2012.23
SNAIL: an IP-based wireless sensor network approach to the internet of things, IEEE Wireless Communications, vol.17, issue.6, pp.34-42, 2010. ,
DOI : 10.1109/MWC.2010.5675776
Datagram Transport Layer Security Version 1.2, IETF RFC, vol.4944, 2012. ,
DOI : 10.17487/rfc6347
End-to-End Transport Security in the IP-Based Internet of Things, 2012 21st International Conference on Computer Communications and Networks (ICCCN), 2012. ,
DOI : 10.1109/ICCCN.2012.6289292
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication, 37th Annual IEEE Conference on Local Computer Networks -- Workshops, pp.956-963, 2012. ,
DOI : 10.1109/LCNW.2012.6424088
Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview, Algorithms, vol.6, issue.2, pp.197-226, 2013. ,
DOI : 10.3390/a6020197
Authorization framework for the Internet-of-Things, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM), pp.1-6, 2013. ,
DOI : 10.1109/WoWMoM.2013.6583465