[1]
R.H. Weber, Internet of things-new security and privacy challenges, Computer Law & Security Review, vol. 26, pp.23-30, (2010).
DOI: 10.1016/j.clsr.2009.11.008
Google Scholar
[2]
Hui Suo, Jiafu Wan, Caifeng Zou and Jianqi Liu, Security in the Internet of Things: A review, 2012 International Conference on Computer Science and Electronics Engineering, HangZhou: 2012. 648-651.
DOI: 10.1109/iccsee.2012.373
Google Scholar
[3]
Dong chen, Guiran Chang, Lizhong Jin, Xiaodong Ren, Jiajia Li, and Fengyun Li, A novel Secure Architecture for the Internet of Things, 2011 Fifth International Conference on Genetic and Evolutionary Computing, TaiWan.
DOI: 10.1109/icgec.2011.77
Google Scholar
[4]
Alex X. Liu, LeRoy A. Bailey, A privacy and authentication protocol for passive RFID tags, Computer Communications 32(2009).
DOI: 10.1016/j.comcom.2009.03.006
Google Scholar
[5]
N. Sastry and D. Wagner, Security considerations for IEEE802. 15. 4 networks, " in Proceedings of the ACM Workshop on Wireless Security (WiSe , 04), p.32–42, Philadelphia, Pa, USA, October (2004).
Google Scholar
[6]
John Lee, Hua Zhou, Zhihong Liang, Xiangcheng Wan, and Yuhong chen, The Wireless Sensor Network Security Protocol Research in Internet of Things, Advances in ECWAC, Vol. 2, AISC 149, p.241–247.
Google Scholar
[7]
Yang Xiao, Hslao-Hwa Chen, Bo Sun, Ruhal Wang, and Sakshl Sethl, MAC Security and Security Overhead Analysis in the IEEE 802. 15. 4 Wireless Sensor Networks, EURASIP Journal onWireless Communications and Networking, Volume 2006, Article ID 93830, Pages 1–12.
DOI: 10.1155/wcn/2006/93830
Google Scholar