2015
DOI: 10.17487/rfc7645
|View full text |Cite
|
Sign up to set email alerts
|

The Keying and Authentication for Routing Protocol (KARP) IS-IS Security Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…CoAP has enabled several machine‐to‐machine (M2M) applications such as smart cities, smart metering, and environmental monitoring . According to the CoAP standards, namely, group communication and observing resources, CoAP clients can define multiple groups of nodes, called monitoring groups, to observe points of interest, specifying the client's preferred communication settings (eg, communication periodicity). Thus, it is an important challenge for CoAP applications to improve the energy efficiency of the periodic multigroup communication …”
Section: Introductionmentioning
confidence: 99%
“…CoAP has enabled several machine‐to‐machine (M2M) applications such as smart cities, smart metering, and environmental monitoring . According to the CoAP standards, namely, group communication and observing resources, CoAP clients can define multiple groups of nodes, called monitoring groups, to observe points of interest, specifying the client's preferred communication settings (eg, communication periodicity). Thus, it is an important challenge for CoAP applications to improve the energy efficiency of the periodic multigroup communication …”
Section: Introductionmentioning
confidence: 99%