SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Vasseur J, Dunkels A. Interconnecting smart objects with IP—the next Internet. Morgan Kaufmann: Waltham, Massachusetts, 2010.
  • 2
    IEEE std. 802.15.4—2003: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs). IEEE, 2003.
  • 3
    Deloche G, Kushalnagar N, Hui J, Culler D. Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944, 2007.
  • 4
    Kent S, Seo K. Security Architecture for the Internet Protocol. RFC 4301, 2005.
  • 5
    Dunkels A, Grönvall B, Voigt T. Contiki—a lightweight and flexible operating system for tiny networked sensors. In Proceedings of 1st IEEE Workshop on Embedded Networked Sensors (EmNetS'04), Tampa, USA, 2004.
  • 6
    Liu A, Ning P. TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of 7th International Conference on Information Processing in Sensor Networks (IPSN'08), Washington, DC, USA, 2008.
  • 7
    Szczechowiak P, Oliveira L, Scott M, Collier M, Dahab R. NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In Proceedings of 5th European Conference on Wireless Sensor Networks (EWSN'08), Bologna, Italy, 2008.
  • 8
    Wood A, Stankovic J. Poster abstract: AMSecure—secure link-layer communication in TinyOS for IEEE 802.15.4-based wireless sensor networks. In Proceedings of 4th ACM Conference on Networked Embedded Sensor Systems (SenSys'06), Boulder, USA, 2006.
  • 9
    Hu W, Corke P, Shih W, Overs L. secfleck: a public key technology platform for wireless sensor networks. In Proceedings of 6th European Conference on Wireless Sensor Networks (EWSN'09), Cork, Ireland, 2009.
  • 10
    Liu D, Ning P. Establishing pairwise keys in distributed sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS), New York, NY, USA, 2003.
  • 11
    Chung A, Roedig U. DHB-KEY: an efficient key distribution scheme for wireless sensor networks. In Proceedings of 4th IEEE International Workshop on Wireless and Sensor Networks Security (WSNS'08), Atlanta, USA, 2008.
  • 12
    ArchRock Corporation. Phynet n4x series, 2008.
  • 13
    Moskowitz R. HIP Diet EXchange (DEX). draft-moskowitz-hip-rg-dex-05, 2011.
  • 14
    Roman R, Alcaraz C, Lopez J, Sklavos N. Key management systems for sensor networks in the context of the Internet of Things. Computers and Electrical Engineering 2011; 37(2): 147159.
  • 15
    Dierks T, Allen C. The TLS protocol version 1.0. RFC 2246, 1999.
  • 16
    Hong S, Kim D, Ha M, et al. SNAIL: an IP-based wireless sensor network approach to the Internet of Things. Wireless Communications, IEEE 2010; 17(6): 3442.
  • 17
    Fouladgar S, Mainaud B, Masmoudi K, Afifi H. Tiny 3-TLS: a trust delegation protocol for wireless sensor networks. In Proceedings of 3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS'03), Hamburg, Germany, 2006.
  • 18
    Granjal J, Silva R, Monteiro E, Sa Silva J, Boavida F. Why is IPsec a viable option for wireless sensor networks. In Proceedings of 4th IEEE International Workshop on Wireless and Sensor Networks Security (WSNS'08), Atlanta, USA, 2008.
  • 19
    Riaz R, Kim K-H, Ahmed HF. Security analysis survey and framework design for IP connected LoWPANs. In Proceedings of 9th International Symposium on Autonomous Decentralized Systems (ISADS'09), Athens, Greece, 2009.
  • 20
    Roman R, Lopez J. Integrating wireless sensor networks and the internet: a security analysis. Internet Research 2009; 19(2): 246259.
  • 21
    Alcaraz C, Najera P, Lopez J, Roman R. Wireless sensor networks and the Internet of Things: do we need a complete integration? In Proceedings of 1st International Workshop on the Security of the Internet of Things (SecIoT'10), Tokyo, Japan, 2010.
  • 22
    Granjal J, Monteiro E, Sá Silva J. Enabling network-layer security on IPv6 wireless sensor networks. In Proceedings of IEEE Global Communications Conference (GLOBECOM'10), Miami, USA, 2010.
  • 23
    Raza S, Chung SDA, Yazar D, Voigt T, Roedig U. Securing communication in 6LoWPAN with compressed IPsec. In Proceedings of 7th International Conference on Distributed Computing in Sensor Systems (DCOSS'11), Barcelona, Spain, 2011.
  • 24
    Deering S, Hinden R. Internet Protocol, Version 6 (IPv6) Specification. RFC 2460, 1998.
  • 25
    Hui J, Thubert P. Compression Format for IPv6 Datagrams in Low Power and Lossy Networks. draft-ietf-6lowpan-hc-15, 2011.
  • 26
    Sastry N, Wagner D. Security considerations for IEEE 802.15.4 networks. In Proceedings of the 3rd ACM Workshop on Wireless Security, WiSe'04, New York, NY, USA, 2004; 3242. ACM.
  • 27
    Kent S. IP Authentication Header. RFC 4302, 2005.
  • 28
    Kent S. IP Encapsulating Security Payload. RFC 4303, 2005.
  • 29
    Manral V. Cryptographic algorithm implementation requirements for encapsulating security payload (ESP) and authentication header (AH). RFC 4835, 2007.
  • 30
    Sakane S, Kamada K, Thomas M, Vilhuber J. Kerberized Internet Negotiation of Keys (KINK). RFC 4430, 2006.
  • 31
    Kaufman C, Hoffman P, Nir Y, Eronen P. Internet Key Exchange Protocol Version 2 (IKEv2). RFC 5996 (Proposed Standard), 2010. Updated by RFC 5998.
  • 32
    Richardson M. A Method for Storing IPsec Keying Material in DNS. RFC 4025 (Proposed Standard), 2005.
  • 33
    Polastre J, Szewczyk R, Culler D. Telos: enabling ultra-low power wireless research. In Proceedings of 4th International Conference on Information Processing in Sensor Networks (IPSN'05), Los Angeles, USA, 2005.
  • 34
    Shamus Software. Multiprecision Integer and Rational Arithmetic C/C++ Library.
  • 35
    Tsiftes N, Dunkels A. A database in every sensor. In Proceedings of the International Conference on Embedded Networked Sensor Systems (ACM SenSys), Seattle, WA, USA, 2011.
  • 36
    Eriksson J, Dunkels A, Finne N, Österlind F, Voigt T. MSPsim—an extensible simulator for MSP430-equipped sensor boards. In Proceedings of 4th European Conference on Wireless Sensor Networks (EWSN'07), Delft, The Netherlands, 2007. Demo Session.
  • 37
    Hoffman P. Cryptographic Suites for IPsec. RFC 4308, 2005.
  • 38
    Dunkels A, Eriksson J, Finne N, Tsiftes N. Powertrace: Network-level Power Profiling for Low-power Wireless Networks. Technical Report T2011:05, Swedish Institute of Computer Science, 2011.
  • 39
    Park C, Lahiri K, Raghunathan A. Battery discharge characteristics of wireless sensor nodes: an experimental analysis. In Proceedings of the IEEE Conf. on Sensor and Ad-hoc Communications and Networks (SECON), Santa Clara, California, USA, September 2005.