A. Niruntasukrat, C. Issariyapat, P. Pongpaibool, K. Meesublak, P. Aiumsupucgul et al., Authorization mechanism for MQTT-based Internet of Things, 2016 IEEE International Conference on Communications Workshops (ICC), pp.290-295, 2016.
DOI : 10.1109/ICCW.2016.7503802

L. Seitz, G. Selander, E. Wahlstroem, S. Erdtman, and H. Tschofenig, Authentication and Authorization for Constrained Environments (ACE), " IETF, Internet-Draft draft-ietf-ace-oauth-authz-06, Progress. [Online]. Available, 2017.

S. Gerdes, O. Bergmann, C. Bormann, G. Selander, and L. Seitz, Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE), " IETF, Internet-Draft draft-ietf-ace- dtls-authorize-00, Progress. [Online], 2017.

L. Seitz, M. Gunnarsson, and F. Palombini, OSCOAP profile of ACE IETF, Internet-Draft draft-seitz-ace- oscoap-profile-02, 2017.

C. Bormann and P. E. Hoffman, Concise Binary Object Representation (CBOR) Available: https, 2013.
DOI : 10.17487/rfc7049

J. Schaad, IETF, Internet-Draft draft-ietf-cose-msg-24 Available: https, Progress. [Online], 2016.

V. G. Martínez, L. H. Encinas, and C. S. Avila, A Survey of the Elliptic Curve Integrated Encryption Scheme, pp.160-223, 2010.

]. G. Selander, J. Mattsson, and F. Palombini, Ephemeral Diffie-Hellman Over COSE (EDHOC), " IETF, Internet-Draft draft-selander-ace-cose-ecdhe-06

M. Jones, H. Tschofenig, E. Wahlstroem, and S. Erdtman, CBOR Web Token (CWT), " IETF, Internet-Draft draft- ietf-ace-cbor-web-token-05, 2017.

A. Online, ´. E. Morin, M. Maman, R. Guizzetti, and A. Duda, Available: http://csrc.nist.gov/groups/ST/lwc- workshop2015/presentations/session7-vincent, Comparison of the Device Lifetime in Wireless Networks for the Internet of Things, pp.7097-7114, 2017.