|
[1]Brad Fitzpatrick, “Distributed Identity: Yadis, ” 2005 http://lj-dev.livejournal.com/683939.html [2]ETSI, “Overview of ETSI TC M2M Activities Activities,” 2012. https://docbox.etsi.org/smartm2m/open/information/m2m_presentation.pdf [3]Kevin Townsend, “Introduction to Bluetooth Low Energy,” 2014. https://learn.adafruit.com/introduction-to-bluetooth-low-energy?view=all [4]The Bluetooth Special Interest Group , “company identifiers,” https://www.bluetooth.com/specifications/assigned-numbers/company-identifiers [5]Andrew Banks and Rahul Gupta, MQTT Version 3.1.1, OASIS Standard, 2014. [6]ETSI TS 102 690 V2.1.1(2013-10). Machine-to-Machine communications (M2M); Functional architecture. [7]Flavia C. Delicato, Paulo F. Pires, Thais Batista, Everton Cavalcante, Bruno Costa, and Thomaz Barros, “Towards an IoT ecosystem,” In Proceedings of the First International Workshop on Software Engineering for Systems-of-Systems (SESoS '13), pp. 25-28, ACM, New York, NY, USA, 2013. [8]International Telecommunication Union, Telecommunication Standardization Sector (ITU-T), ITU-T recommendation Y2060: Overview of internet of thing. Geneva, Switzerland, 2012 [9]J. Nieminen, T. Savolainen, M. Isomaki, B. Patil, Z. Shelby, C. Gome, “Transmission of IPv6 Packets over BLUETOOTH(R) Low Energy,” Work in Progress, Internet Engineering Task Force (IETF) draft-ietf-6lo-btle-03, 2014. [10]J. Soldatos, M. Serrano, M. Hauswirth, “Convergence of Utility Computing with the Internet-of-Things,” In Proceedings of the 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 874-879, 2012. [11]Julien Mineraud, Oleksiy Mazhelis, Xiang Su, and Sasu Tarkoma, A gap analysis of Internet-of-Things platforms, eprint arXiv:1502.01181, 2015. [12]Kevin Townsend and Carles Cufí, “Getting Started with Bluetooth Low Energy: Tools and Techniques for Low-Power Networking,” O'Reilly Media, 2014.
[13]M. Eisenhauer, P. Rosengren, and P. Antolin, “A Development Platform for Integrating Wireless Devices and Sensors into Ambient Intelligence Systems,” In Proceedings of the SECON Workshops '09, pp. 1-3, 2009. [14]Olivier Hersent, David Boswarthick, and Omar Ellolumi, “The Internet of Things: Key Applications and Protocols,” Wiley, 2012. [15]OpenID specs, "OpenID Authentication 2.0 – Final, " 2007. [16]The Bluetooth Special Interest Group, Bluetooth Core Specification 4.2, 2013. [17]Weijun Qin, Qiang Li, Limin Sun, Hongsong Zhu, and Yan Liu, “RestThing: A Restful Web Service Infrastructure for Mash-Up Physical and Web Resources,” In Proceedings of the 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing (EUC), pp. 197-204, 2011. [18]Xin Ma, Wei Luo, “The analysis of 6LowPAN technology,” IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, vol. 1, no. 3, pp. 963- 966, 2008. [19]Z. Shelby, K. Hartke, and C. Bormann, “The Constrained Application Protocol (CoAP),” Internet Engineering Task Force (IETF) RFC 7252, 2014.
|