Mostrando 10 resultados de: 12
Filtros aplicados
Publisher
2008 5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2008(1)
2010 IFIP Wireless Days, WD 2010(1)
2011 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2011 - Proceedings(1)
2013 IFIP Networking Conference, IFIP Networking 2013(1)
Ad Hoc Networks(1)
Área temáticas
Física aplicada(4)
Otros problemas y servicios sociales(2)
Culto público y otras prácticas(1)
Funcionamiento de bibliotecas y archivos(1)
Producción(1)
Área de conocimiento
Ciencias de la computación(9)
Red informática(8)
Red de sensores inalámbricos(3)
Comunicación(2)
Simulación por computadora(2)
Origen
scopus(12)
A secure interconnection model for IPv6 enabled Wireless Sensor Networks
Conference ObjectAbstract: The usage of IPv6 on Wireless Sensor Networks (WSNs) can enable the integration of existing and newPalabras claves:61owpan, AH, Application security profiles, ESP, Wireless Sensor NetworksAutores:Granjal J., Jorge Sá Silva, Monteiro E.Fuentes:scopusA taxonomy of Wireless Sensor Networks with Qos
Conference ObjectAbstract: Wireless Sensor Networks (WSNs) are no longer limited to scenarios of uncontrolled performance. A nePalabras claves:qos, sensors, taxonomyAutores:Granjal J., Jorge Sá Silva, Monteiro E., Pan Q., Pereira V.N.S.S., Silva R.M.Fuentes:scopusConstruction of an IPV6 testbed with SSM support
Conference ObjectAbstract: Source-Specific Multicast (SSM) was developed in order to overcome the current limitations of multicPalabras claves:IPV6, Multicasting, Routing protocols, Source-Specific MulticastAutores:Boavida F., Granjal J., Jorge Sá Silva, Trindade A.Fuentes:scopusApplication-layer security for the WoT: Extending CoAP to support end-to-end message security for internet-integrated sensing applications
Conference ObjectAbstract: Future Web of Things (WoT) applications employing constrained wireless sensing devices will requirePalabras claves:CoAP security, DTLS, end-to-end application-layer security, granular security, message securityAutores:Granjal J., Jorge Sá Silva, Monteiro E.Fuentes:scopusEnabling network-layer security on IPv6 wireless sensor networks
Conference ObjectAbstract: Security plays a vital role in enabling future integration of Wireless Sensor Networks (WSNs) with tPalabras claves:6LoWPAN, AH HC, ESP HC, Security headers, Wireless Sensor NetworksAutores:Granjal J., Jorge Sá Silva, Monteiro E.Fuentes:scopusEnd-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication
Conference ObjectAbstract: The Internet of Things (IoT) describes a vision of a future Internet where constrained sensing and aPalabras claves:COAP, delegated ECC public-key authentication, DTLS, internet of things, mutual authenticationAutores:Granjal J., Jorge Sá Silva, Monteiro E.Fuentes:scopusNetwork-layer security for the Internet of Things using TinyOS and BLIP
ArticleAbstract: The design of standard communications and security mechanisms for resource-constrained sensing appliPalabras claves:6LoWPAN, BLIP, Compressed security headers, internet of things, smart objects, tinyOSAutores:Granjal J., Jorge Sá Silva, Monteiro E.Fuentes:scopusOn the effectiveness of end-to-end security for Internet-integrated sensing applications
Conference ObjectAbstract: While realizing that most of the applications currently envisioned for the Internet of Things (IoT)Palabras claves:6LoWPAN, AH, COAP, DTLS, ESP, IOT, securityAutores:Granjal J., Jorge Sá Silva, Monteiro E.Fuentes:scopusOn the feasibility of secure application-layer communications on the Web of Things
Conference ObjectAbstract: The availability of inexpensive sensing devices capable of wireless communications enables the desigPalabras claves:6LoWPAN, COAP, DTLS, ECC, security, WoTAutores:Granjal J., Jorge Sá Silva, Monteiro E.Fuentes:scopusSecurity for the internet of things: A survey of existing protocols and open research issues
ArticleAbstract: The Internet of Things (IoT) introduces a vision of a future Internet where users, computing systemsPalabras claves:6LoWPAN, COAP, DTLS, End-to-end security, IEEE 802.15.4, internet of things, RPL, securityAutores:Granjal J., Jorge Sá Silva, Monteiro E.Fuentes:scopus