참고문헌
- IEEE std. 802.15.4-2011, Part 15.4: Low-Rate WPANs, June 2011.
- S. Sciancalepore, S. G. Piro, E. Vogli, G. Boggia, and L. A. Grieco, "On Securing IEEE 802.15.4 Networks through a Standard Compliant Framework," In Proc. of the 2014 Euro Med Telco Conference, pp. 1-6, Naples, Nov. 12-15, 2014.
- G. Piro, G. Boggia, L. A. Grieco, "A Standard Compliant Security Framework for IEEE 802.15.4 Networks," in Proc. of the IEEE World Forum on Internet of Things, pp. 27-30, Seoul, Mar. 6-8, 2014.
- P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, "PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications," International Journal of Distributed Sensor Networks, vol. 2014, Article ID 357430.
- S. Sciancalepore, A. Capossele, G. Piro, G. Boggia, G. Bianchi, "Key Management Protocol with Implicit Certificates for IoT systems," In Proc. of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, pp. 37-42, Florence, May 18-22, 2015.
- Certicom Research, Standard for Efficient Cryptography, SEC 1: Elliptic Curve Cryptography, Sep. 2000.
- T. Aura, "Cryptographically Generated Addresses," IETF RFC 3972, Mar. 2005.
- C. Lederer, R. Mader, M. Koschuch, J. Grossschadl, A. Szekely, and S. Tillich, "Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks," in Information Security Theory and Practice - WISTP 2009, LNCS, vol. 5746. Springer Verlag, pp. 112-127, 2009.
- J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, "System Architecture Directions for Networked Sensors," in Proc. of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems, vol. 35, pp. 93-104, Dec. 2000,.