OSCAR: Object security architecture for the Internet of Things
- 1 September 2015
- journal article
- research article
- Published by Elsevier in Ad Hoc Networks
- Vol. 32, 3-16
- https://doi.org/10.1016/j.adhoc.2014.12.005
Abstract
No abstract availableKeywords
All Related Versions
Funding Information
- French National Research Agency
- French national association for research and technology (CIFRE-2012/0692)
- European Commission
This publication has 16 references indexed in Scilit:
- GreenNet: An Energy-Harvesting IP-Enabled Wireless Sensor NetworkIEEE Internet of Things Journal, 2015
- Delegation-based authentication and authorization for the IP-based Internet of ThingsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- DTLS based security and two-way authentication for the Internet of ThingsAd Hoc Networks, 2013
- Privacy preserving cloud data access with multi-authoritiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic OverviewAlgorithms, 2013
- Application-Layer Security for the WoT: Extending CoAP to Support End-to-End Message Security for Internet-Integrated Sensing ApplicationsLecture Notes in Computer Science, 2013
- End-to-end security for sleepy smart object networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- A data-oriented (and beyond) network architectureACM SIGCOMM Computer Communication Review, 2007
- Sizzle: A standards-based end-to-end security architecture for the embedded InternetPervasive and Mobile Computing, 2005