Standards
- RFC 7228: Terminology for Constrained-Node Networks
- RFC 7744: Use Cases for Authentication and Authorization in Constrained Environments
- RFC 7252: The Constrained Application Protocol (CoAP)
- DRAFT: CoRE Resource Directory (draft-ietf-core-resource-directory-14)
- RFC 7641: Observing Resources in the Constrained Application Protocol (CoAP)
- RFC 7390: Group Communication for the Constrained Application Protocol (CoAP)
- DRAFT: Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE) draft-ietf-ace-dtls-authorize-03
- DRAFT: Object Security for Constrained RESTful Environments (OSCORE) draft-ietf-core-object-security-14
- DRAFT: OSCORE profile of the Authentication and Authorization for Constrained Environments Framework draft-ietf-ace-oscore-profile-02
- RFC 6940: REsource LOcation And Discovery (RELOAD) Base Protocol
- RFC 7650: A Constrained Application Protocol (CoAP) Usage for REsource LOcation And Discovery (RELOAD)
- RFC 7374: Service Discovery Usage for REsource LOcation And Discovery (RELOAD)
- DNS Service Discovery (DNS-SD)
- DRAFT: CoRE Resource Directory: DNS-SD mapping (draft-ietf-core-rd-dns-sd-02)
Research
- New Paradigms for Access Control in Constrained Environments
- An Authentication and Access Control Framework for CoAP-based Internet of Things
- Using RELOAD and CoAP for wide area sensor and actuator networking
- Edge-Centric Distributed Discovery and Access in the Internet of Things
- Resource discovery in Internet of Things: Current trends and future standardization aspects
- Development of Virtual Resource Based IoT Proxy for Bridging Heterogeneous Web Services in IoT Networks
- Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.
- A Distributed ICN-based IoT Network Architecture: An Ambient Assisted Living Application Case Study
No comments:
Post a Comment