A Study of LoRa: Long Range and Low Power Networks for the Internet of Things, Sensors, vol.16, p.9, 2016. ,
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices, Smart Card Research and Advanced Applications, pp.158-172, 2012. ,
spongent: A Lightweight Hash Function, Cryptographic Hardware and Embedded Systems-CHES 2011, pp.312-325, 2011. ,
Counteracting Denialof-Sleep Attacks in Wake-Up-Radio-Based Sensing Systems, 13th Annual IEEE Int. Conference on Sensing, Communication, and Networking (SECON, pp.1-9, 2016. ,
, Secure Hash Standard. Federal Inf. Process. Stds. (NIST FIPS)180-4, 2015.
, Advanced Encryption Standard (AES). Federal Inf. Process. Stds. (NIST FIPS)-197, 2001.
Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks, 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp.191-196, 2009. ,
Analytic Comparison of Wake-up Receivers for WSNs and Benefits over the Wake-on Radio Scheme, Proc. 7th ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, pp.99-106, 2012. ,
Efficient time synchronized one-time password scheme to provide secure wake-up authentication on wireless sensor networks, International Journal of Advanced Smart Sensor Network Systems, vol.3, pp.1-11, 2013. ,
A survey on IEEE 802.11ah: An enabling networking technology for smart cities, Computer Communications, vol.58, pp.53-69, 2015. ,
Secure Wake-Up Scheme for WBANs, IEICE Transactions on Communications E93.B, vol.4, pp.854-857, 2010. ,
A secure wake-up scheme for low power wireless sensor nodes, 2014 International Conference on Collaboration Technologies and Systems (CTS), pp.279-286, 2014. ,
Low-power Wireless Sensor Network Platforms, Handbook of Signal Processing Systems, pp.123-160, 2010. ,
Bluetooth LE Finds Its Niche, IEEE Pervasive Computing, vol.12, pp.12-16, 2013. ,
User-Level ISA, Version 2.0. EECS Department, vol.I, 2014. ,