- -

A Network Access Control Framework for 6LoWPAN Networks

RiuNet: Repositorio Institucional de la Universidad Politécnica de Valencia

Compartir/Enviar a

Citas

Estadísticas

  • Estadisticas de Uso

A Network Access Control Framework for 6LoWPAN Networks

Mostrar el registro completo del ítem

Oliveira, LML.; Rodrigues, JJPC.; De Sousa, AF.; Lloret, J. (2013). A Network Access Control Framework for 6LoWPAN Networks. Sensors. 13(1):1210-1230. doi:10.3390/s130101210

Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/10251/44026

Ficheros en el ítem

Metadatos del ítem

Título: A Network Access Control Framework for 6LoWPAN Networks
Autor: Oliveira, Luis M. L. Rodrigues, Joel J. P. C. de Sousa, Amaro F. Lloret, Jaime
Entidad UPV: Universitat Politècnica de València. Departamento de Comunicaciones - Departament de Comunicacions
Universitat Politècnica de València. Instituto de Investigación para la Gestión Integral de Zonas Costeras - Institut d'Investigació per a la Gestió Integral de Zones Costaneres
Fecha difusión:
Resumen:
Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, ...[+]
Palabras clave: wireless sensor networks , WSN , 6LoWPAN , network access control
Derechos de uso: Reconocimiento (by)
Fuente:
Sensors. (issn: 1424-8220 )
DOI: 10.3390/s130101210
Editorial:
MDPI
Versión del editor: http://dx.doi.org/10.3390/s130101210
Código del Proyecto:
info:eu-repo/grantAgreement/FCT//PEst-OE%2FEEI%2FLA0008%2F2011/PT/
Agradecimientos:
This work has been partially supported by the Instituto de Telecomunicacoes, Next Generation Networks and Applications Group (NetGNA), Portugal, by National Funding from the FCT - Fundacao para a Ciencia e Tecnologia through ...[+]
Tipo: Artículo

References

http://www.ietf.org/rfc/rfc4919.txt

Oliveira, L. M. L., de Sousa, A. F., & Rodrigues, J. J. P. C. (2011). Routing and mobility approaches in IPv6 over LoWPAN mesh networks. International Journal of Communication Systems, 24(11), 1445-1466. doi:10.1002/dac.1228

Gershenfeld, N., Krikorian, R., & Cohen, D. (2004). The Internet of Things. Scientific American, 291(4), 76-81. doi:10.1038/scientificamerican1004-76 [+]
http://www.ietf.org/rfc/rfc4919.txt

Oliveira, L. M. L., de Sousa, A. F., & Rodrigues, J. J. P. C. (2011). Routing and mobility approaches in IPv6 over LoWPAN mesh networks. International Journal of Communication Systems, 24(11), 1445-1466. doi:10.1002/dac.1228

Gershenfeld, N., Krikorian, R., & Cohen, D. (2004). The Internet of Things. Scientific American, 291(4), 76-81. doi:10.1038/scientificamerican1004-76

Hui, J. W., & Culler, D. E. (2008). Extending IP to Low-Power, Wireless Personal Area Networks. IEEE Internet Computing, 12(4), 37-45. doi:10.1109/mic.2008.79

http://www.ietf.org/rfc/rfc4861.txt

Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(2), 2-23. doi:10.1109/comst.2006.315852

Oliveira, L. M. L., Rodrigues, J. J. P. C., de Sousa, A. F., & Lloret, J. (2012). Denial of service mitigation approach for IPv6-enabled smart object networks. Concurrency and Computation: Practice and Experience, 25(1), 129-142. doi:10.1002/cpe.2850

Xiaojiang Du, & Hsiao-Hwa Chen. (2008). Security in wireless sensor networks. IEEE Wireless Communications, 15(4), 60-66. doi:10.1109/mwc.2008.4599222

Pelechrinis, K., Iliofotou, M., & Krishnamurthy, S. V. (2011). Denial of Service Attacks in Wireless Networks: The Case of Jammers. IEEE Communications Surveys & Tutorials, 13(2), 245-257. doi:10.1109/surv.2011.041110.00022

Lopez, J., Roman, R., & Alcaraz, C. (2009). Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks. Lecture Notes in Computer Science, 289-338. doi:10.1007/978-3-642-03829-7_10

Elaine Shi, & Perrig, A. (2004). Designing Secure Sensor Networks. IEEE Wireless Communications, 11(6), 38-43. doi:10.1109/mwc.2004.1368895

Roman, R., Lopez, J., & Gritzalis, S. (2008). Situation awareness mechanisms for wireless sensor networks. IEEE Communications Magazine, 46(4), 102-107. doi:10.1109/mcom.2008.4481348

Sakarindr, P., & Ansari, N. (2007). Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks. IEEE Wireless Communications, 14(5), 8-20. doi:10.1109/mwc.2007.4396938

Khan, M. K., & Alghathbar, K. (2010). Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’. Sensors, 10(3), 2450-2459. doi:10.3390/s100302450

Xiao, Y., Rayi, V. K., Sun, B., Du, X., Hu, F., & Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Computer Communications, 30(11-12), 2314-2341. doi:10.1016/j.comcom.2007.04.009

Kun Sun, Peng Ning, & Wang, C. (2005). Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks. IEEE Transactions on Dependable and Secure Computing, 2(3), 177-189. doi:10.1109/tdsc.2005.36

Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). Wireless Networks, 8(5), 521-534. doi:10.1023/a:1016598314198

Araz, O., & Qi, H. (2006). Load-balanced key establishment methodologies in wireless sensor networks. International Journal of Security and Networks, 1(3/4), 158. doi:10.1504/ijsn.2006.011775

http://www.ietf.org/rfc/rfc4944.txt

http://www.ietf.org/rfc/rfc6550.txt

http://www.ietf.org/rfc/rfc4862.txt

http://www.ietf.org/rfc/rfc4291.txt

http://www.ietf.org/rfc/rfc3971.txt

http://www.ietf.org/rfc/rfc5548.txt

http://www.ietf.org/rfc/rfc5673.txt

http://www.ietf.org/rfc/rfc5826.txt

http://www.ietf.org/rfc/rfc5867.txt

Jeonggil Ko, Terzis, A., Dawson-Haggerty, S., Culler, D. E., Hui, J. W., & Levis, P. (2011). Connecting low-power and lossy networks to the internet. IEEE Communications Magazine, 49(4), 96-101. doi:10.1109/mcom.2011.5741163

Mottola, L., & Picco, G. P. (2011). Programming wireless sensor networks. ACM Computing Surveys, 43(3), 1-51. doi:10.1145/1922649.1922656

Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., & Silva, F. (2003). Directed diffusion for wireless sensor networking. IEEE/ACM Transactions on Networking, 11(1), 2-16. doi:10.1109/tnet.2002.808417

Deluge T2-TinyOS Documentation Wikihttp://docs.tinyos.net/tinywiki/index.php/Deluge_T2

[-]

recommendations

 

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro completo del ítem