2013
DOI: 10.1109/jsen.2013.2266116
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0
3

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 124 publications
(42 citation statements)
references
References 25 publications
0
39
0
3
Order By: Relevance
“…More specifically, the IETF has standardized 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks), ROLL (routing over lowpower and lossy-networks), and CoAP (constrained application protocol) to equip constrained devices (Cai et al 2014;Chen et al 2014;Esad-Djou 2014;Gu et al 2014;Hoyland et al 2014;HP Company 2014;Kang et al 2014;Keoh et al 2014;Li and Xiong 2013;Li et al 2014a;Oppliger 2011;Raza et al 2013;Roe 2014;Tan et al 2014;Wang and Wu 2010;Xiao et al 2014;Xu et al 2014a;Xu et al 2014b;Yao et al (WPA2) or 802.1AE (MACsec). In recent, the security standards for the RFID market have been reported in (Raza et al 2012).…”
Section: State-of-the-artmentioning
confidence: 99%
“…More specifically, the IETF has standardized 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks), ROLL (routing over lowpower and lossy-networks), and CoAP (constrained application protocol) to equip constrained devices (Cai et al 2014;Chen et al 2014;Esad-Djou 2014;Gu et al 2014;Hoyland et al 2014;HP Company 2014;Kang et al 2014;Keoh et al 2014;Li and Xiong 2013;Li et al 2014a;Oppliger 2011;Raza et al 2013;Roe 2014;Tan et al 2014;Wang and Wu 2010;Xiao et al 2014;Xu et al 2014a;Xu et al 2014b;Yao et al (WPA2) or 802.1AE (MACsec). In recent, the security standards for the RFID market have been reported in (Raza et al 2012).…”
Section: State-of-the-artmentioning
confidence: 99%
“…For example, it would be valuable to explore the possibility of achieving a signature scheme which combines our scheme with ring signature. Using our scheme to construct a practical complete application is also another interesting problem [31,32].…”
Section: Concludingmentioning
confidence: 99%
“…Different with the existing works in the literature, our paper aims to design and implement a target-based low-overhead approach to monitor critical files effectively by using VMI, which can support both Linux and Windows VMs. Several papers (e.g., [24]- [29]) have also studied related security issues.…”
Section: Related Workmentioning
confidence: 99%