Author:
Chu Hai-Cheng,Sung Chun-Hsien,Lee Hui-Lin
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference29 articles.
1. Xu T, Wendt JB, Potkonjak M (2014) Security of IoT systems: design challenges and opportunities. In: Proceedings of the IEEE/ACM International Conference on Computer-Aided Design (ICCAD ‘14), p 417–423
2. Plonka D Measurement and analysis for the Internet of Things, last visited July 18, 2016,
https://www.ietf.org/proceedings/96/slides/slides-96-maprg-8.pdf
3. Granjal J, Monteiro E, Sá Silva J (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutorials 17(3):1294–1312
4. Hennebert C, Dos Santos J (2014) Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J 1(5):384–398
5. Qiu T, Liu J, Si W, Han M, Ning H, Atiquzzaman M (2017) A Data-driven robustness algorithm for the internet of things in smart cities - IEEE Communications Magazine
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献