Authorization mechanism for MQTT-based Internet of Things, 2016 IEEE International Conference on Communications Workshops (ICC), pp.290-295, 2016. ,
DOI : 10.1109/ICCW.2016.7503802
Authentication and Authorization for Constrained Environments (ACE), " IETF, Internet-Draft draft-ietf-ace-oauth-authz-06, Progress. [Online]. Available, 2017. ,
Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE), " IETF, Internet-Draft draft-ietf-ace- dtls-authorize-00, Progress. [Online], 2017. ,
OSCOAP profile of ACE IETF, Internet-Draft draft-seitz-ace- oscoap-profile-02, 2017. ,
Concise Binary Object Representation (CBOR) Available: https, 2013. ,
DOI : 10.17487/rfc7049
IETF, Internet-Draft draft-ietf-cose-msg-24 Available: https, Progress. [Online], 2016. ,
A Survey of the Elliptic Curve Integrated Encryption Scheme, pp.160-223, 2010. ,
Ephemeral Diffie-Hellman Over COSE (EDHOC), " IETF, Internet-Draft draft-selander-ace-cose-ecdhe-06 ,
CBOR Web Token (CWT), " IETF, Internet-Draft draft- ietf-ace-cbor-web-token-05, 2017. ,
Available: http://csrc.nist.gov/groups/ST/lwc- workshop2015/presentations/session7-vincent, Comparison of the Device Lifetime in Wireless Networks for the Internet of Things, pp.7097-7114, 2017. ,