Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection | 4 | 0.40 | 2021 |
PKI4IoT: Towards Public Key Infrastructure for the Internet of Things | 2 | 0.51 | 2020 |
Group Rekeying Based On Member Join History | 0 | 0.34 | 2020 |
FoNAC - An Automated Fog Node Audit and Certification Scheme | 2 | 0.39 | 2020 |
Application Layer Key Establishment for End-to-End Security in IoT | 0 | 0.34 | 2020 |
Indraj: digital certificate enrollment for battery-powered wireless devices | 1 | 0.37 | 2019 |
Towards Supporting IoT Device Storage and Network Security Using DTLS | 0 | 0.34 | 2019 |
TinyIKE: Lightweight IKEv2 for Internet of Things | 1 | 0.36 | 2019 |
FDTLS: Supporting DTLS-Based Combined Storage and Communication Security for IoT Devices | 1 | 0.37 | 2019 |
Group-IKEv2 for multicast IPsec in the internet of things. | 0 | 0.34 | 2019 |
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control | 0 | 0.34 | 2018 |
Towards Formal Verification of Contiki: Analysis of the AESCCM* Modules with Frama-C | 0 | 0.34 | 2018 |
POSTER: On Compressing PKI Certificates for Resource Limited Internet of Things Devices. | 0 | 0.34 | 2018 |
Protecting Glossy-Based Wireless Networks from Packet Injection Attacks | 1 | 0.35 | 2017 |
Intrusion Detection in the RPL-connected 6LoWPAN Networks. | 2 | 0.36 | 2017 |
SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things. | 6 | 0.57 | 2017 |
Axiom: DTLS-Based Secure IoT Group Communication. | 4 | 0.41 | 2017 |
Building the Internet of Things with bluetooth smart. | 14 | 0.83 | 2017 |
Blockchain and IoT - Mind the Gap. | 0 | 0.34 | 2017 |
Lightweight X.509 Digital Certificates for the Internet of Things. | 0 | 0.34 | 2017 |
Fusion: Coalesced Confidential Storage and Communication Framework for the IoT | 6 | 0.58 | 2016 |
S3K: Scalable Security With Symmetric Keys - DTLS Key Establishment for the Internet of Things. | 18 | 0.79 | 2016 |
Bluetooth smart: An enabling technology for the Internet of Things | 10 | 0.75 | 2015 |
BSD-based elliptic curve cryptography for the open Internet of Things | 4 | 0.50 | 2015 |
An experimental study of attacks on the availability of Glossy. | 3 | 0.39 | 2015 |
Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN. | 45 | 2.52 | 2014 |
Delegation-based authentication and authorization for the IP-based Internet of Things | 32 | 1.68 | 2014 |
Combined secure storage and communication for the Internet of Things. | 8 | 0.72 | 2013 |
SVELTE: Real-time intrusion detection in the Internet of Things | 119 | 4.47 | 2013 |
Routing Attacks And Countermeasures In The Rpl-Based Internet Of Things | 60 | 2.33 | 2013 |
Codo: confidential data storage for wireless sensor networks | 4 | 0.66 | 2012 |
6LoWPAN Compressed DTLS for CoAP | 45 | 3.21 | 2012 |
Securing communication in 6LoWPAN with compressed IPsec | 78 | 8.04 | 2011 |
Demo abstract: Securing communication in 6LoWPAN with compressed IPsec | 2 | 0.37 | 2011 |
Security considerations for the WirelessHART protocol | 19 | 1.28 | 2009 |
Accurate Power Profiling of Sensornets with the COOJA/MSPSim Simulator | 2 | 0.39 | 2009 |