Author:
Chellappan V.,Sivalingam K.M.
Reference44 articles.
1. Green J. IoT reference model. http://www.iotwf.com/resources/72; 2014.
2. Enforcing security mechanisms in the IP-based Internet of Things: an algorithmic overview;Cirani;Algorithms,2013
3. Bonetto R, Bui N, Lakkundi V, Olivereau A, Serbanati A, Rossi M. Secure communication for smart IoT objects: protocol stacks, use cases and practical examples. In: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), San Francisco; 2012. p. 1–7.
4. Security challenges in the IP-based Internet of Things;Heer;Wirel. Pers Commun,2011
5. Shelby Z. Constrained restful environments (CoRE) link format. RFC 6690, RFC Editor; 2012.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献