Malicious control system cyber security attack case study?Maroochy Water Services, 2008. ,
The transport layer security (TLS) protocol version 1.2, 2008. ,
DOI : 10.17487/rfc5246
SP 800-38C. Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality, 2004. ,
SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, 2007. ,
MAC sub-layer node authentication in OCARI, 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), pp.1-6, 2016. ,
DOI : 10.1109/PEMWN.2016.7842906
URL : https://hal.archives-ouvertes.fr/hal-01417671
A Lightweight Mutual Authentication Protocol for the IoT, 2017. ,
DOI : 10.1109/PEMWN.2016.7842906
Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile, 2002. ,
DOI : 10.17487/rfc3280
DTLS based security and two-way authentication for the Internet of Things, Ad Hoc Networks, pp.2710-2723, 2013. ,
DOI : 10.1016/j.adhoc.2013.05.003
HMAC: Keyedhashing for message authentication, 1997. ,
DOI : 10.17487/rfc2104
URL : http://ietfreport.isoc.org/rfc/PDF/rfc2104.pdf
A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, pp.31-43, 1997. ,
DOI : 10.1109/CSFW.1997.596782
HIP Security Architecture for the IP-Based Internet of Things, 2013 27th International Conference on Advanced Information Networking and Applications Workshops, pp.1331-1336, 2013. ,
DOI : 10.1109/WAINA.2013.158
HOTP: An HMAC-based one-time password algorithm. IETF, RFC 4226, 2005. ,
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.5588
Securing IoT for smart home system, Consumer Electronics (ISCE), 2015 IEEE International Symposium on, pp.1-2, 2015. ,