G Gan, Z Lu, J Jiang - 2011 international conference on internet …, 2011 - ieeexplore.ieee.org
… be applied to Internet of Things and provide security as authentication encryption and
mechanisms. However, according to the characteristics of the network layer, we need to adjust the …