Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…HIP has become an increasingly popular approach to offer secure communication among the Internet of Things (Kuptsov et al, 2012). In addition, we developed a multi-domain attribute-enriched role-based access control architecture (Zao et al, 2014).…”
Section: Discussionmentioning
confidence: 99%
“…HIP has become an increasingly popular approach to offer secure communication among the Internet of Things (Kuptsov et al, 2012). In addition, we developed a multi-domain attribute-enriched role-based access control architecture (Zao et al, 2014).…”
Section: Discussionmentioning
confidence: 99%
“…The connection of WSNs to the Internet enables the ex- 29 ploitation of sensing reports (that are often massive) in web 30 applications and services, which is possible with the elastic 31 storage and processing services brought by cloud computing, 32 and which leads to a ubiquitous access to WSN's data. The 33 integration of WSNs in the Internet is often realized across 34 the adoption of adapted extensions of the standard commu- net of things seems to be more difficult, due to the domi- 85 nant heterogeneity with its various forms especially, those 86 which are related to resources availability in the involved 87 entities. 88 In classical applications of WSNs, where the Internet were 89 used only as a transporting medium of sensing reports to the 90 task manager, adversaries were obliged to access the network 91 physically, so that they could successfully attack it.…”
Section: Article In Pressmentioning
confidence: 99%
“…The adoption of HIP to secure WSNs applications is re-507 cently gaining attention[34,35]. Enabling end-to-end data security in network layer by 509 means of IPsec protocol (whether it is coupled with HIP 510 or IKE) allows securing all types of transported traffic.…”
mentioning
confidence: 99%
“…Second, the open environment, in which the medical sensor networks will typically operate, is uncontrollable and not trustworthy. For example, the sensor nodes are usually placed in hostile environments, which make them vulnerable to compromise attacks .…”
Section: System Architecturementioning
confidence: 99%