Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference36 articles.
1. Internet of things: A survey on enabling technologies, protocols, and applications;Al-Fuqaha;IEEE Commun. Surv. Tut.,2015
2. Integration of cloud computing and internet of things: a survey;Botta;Future Gener. Comput. Syst.,2016
3. Security for the internet of things: a survey of existing protocols and open research issues;Granjal;IEEE Commun. Surv. Tut.,2015
4. Z. Shelby, K. Hartke, C. Bormann, The constrained application protocol (coap), 2014.
5. E. Rescorla, N. Modadugu, Datagram transport layer security version 1.2, 2012.
Cited by
76 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Authentication in the Internet of Things: A Review;2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC);2024-01-08
2. Toward Smart Healthcare: Challenges and Opportunities in IoT and ML;Studies in Computational Intelligence;2024
3. Lightweight Cryptography Model for Overhead and Delay Reduction in the Network;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2024
4. GOLPMA: GROUP ORIENTED LIGHTWEIGHT PAYLOAD-BASED MUTUAL AUTHENTICATION FOR SECURED IoT COMMUNICATION;Suranaree Journal of Science and Technology;2023-11-10
5. Lightweight Network-Based IoT Device Authentication in Cloud Services;2023 IEEE 31st International Conference on Network Protocols (ICNP);2023-10-10