Author:
Harish M.,Karthick R.,Mohan Rajan R.,Vetriselvi V.
Reference14 articles.
1. Anand M, Ives Z, Lee I (2005) Quantifying eavesdropping vulnerability in sensor networks. In: Proceedings of the 2nd international workshop on data management for sensor networks, pp 3–9, ACM
2. Brachmann M, Garcia-Morchon O, Kirsche M (2011) Security for practical coap applications: issues and solution approaches. In: Proceedings of the 10th GI/ITG KuVS Fachgespraech Sensornetze (FGSN11), pp 15–16. Paderborn, Germany
3. Gou Q, Yan L, Liu Y, Li Y (2013) Construction and strategies in iot security system. In: 2013 IEEE international conference on green computing and communications and IEEE internet of things and IEEE cyber, physical and social computing, pp 1129–1132. https://doi.org/10.1109/GreenCom-iThings-CPSCom.2013.195
4. Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutor 17(3):1294–1312
5. Heer T, Garcia-Morchon O, Hummen R, Keoh SL, Kumar SS, Wehrle K (2011) Security challenges in the ip-based internet of things. Wireless Pers Commun 61(3):527–542