메뉴 건너뛰기




Volumn , Issue , 2013, Pages 1129-1132

Construction and strategies in IoT security system

Author keywords

Network of things; Security construction; Security problems; Study on strategies

Indexed keywords

COMMUNICATION TECHNOLOGIES; EXISTING PROBLEMS; INTERNET OF THING (IOT); SECURITY PROBLEMS; STUDY ON STRATEGIES;

EID: 84893462100     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GreenCom-iThings-CPSCom.2013.195     Document Type: Conference Paper
Times cited : (83)

References (12)
  • 1
    • 80052687700 scopus 로고    scopus 로고
    • Network information security architecture based on internet of things [J]
    • LIU Yanbing, HU Wenping, DU Jiang. Network Information Security Architecture Based on Internet of Things [J]. ZTE technology journal, 2011, 17-20(01).
    • (2011) ZTE Technology Journal , vol.17-20 , Issue.1
    • Liu, Y.1    Hu, W.2    Du, J.3
  • 2
    • 84893516014 scopus 로고    scopus 로고
    • Security model of internet of things based on hierarchy [J]
    • SUN Zhixin, LUO Bingqing, LUO Shengmei, ZHU Hongbo. Security Model of Internet of Things Based on Hierarchy [J]. Computer engineering, 2011,1-7(20)
    • (2011) Computer Engineering , vol.1-7 , Issue.20
    • Sun, Z.1    Luo, B.2    Luo, S.3    Zhu, H.4
  • 3
    • 84861076200 scopus 로고    scopus 로고
    • Security architecture and key technologies for IoT/CPS[J]
    • DING Chao, YANG Lijun, WU Meng. Security Architecture and Key Technologies for IoT/CPS[J]. ZTE technology journal,2011, 11-16(01).
    • (2011) ZTE Technology Journal , vol.11-16 , Issue.1
    • Ding, C.1    Yang, L.2    Wu, M.3
  • 6
    • 84893435285 scopus 로고    scopus 로고
    • Brief analysis of IoT security [J]
    • SONG Yongguo. Brief analysis of IoT security [J]. Computer Knowledge and Technology, 2011, 2528-2530(11).
    • (2011) Computer Knowledge and Technology , vol.2528-2530 , Issue.11
    • Song, Y.1
  • 7
    • 84893508174 scopus 로고    scopus 로고
    • The internet of things security model based on middleware [J]
    • YAO yun. The Internet of things security model based on middleware [J]. Computer Knowledge and Technology, 2011,68-69(01).
    • (2011) Computer Knowledge and Technology , vol.68-69 , Issue.1
    • Yao, Y.1
  • 9
    • 84893471865 scopus 로고    scopus 로고
    • Analysis and suggestion on information security of internet of things perceptual layer [J]
    • MA Ji-feng, LIANG Hao. Analysis and suggestion on information security of Internet of Things perceptual layer [J]. Modern Electronics Technique, 2012, 76-78(19).
    • (2012) Modern Electronics Technique , vol.76-78 , Issue.19
    • Ma, J.-F.1    Liang, H.2
  • 10
    • 84893495508 scopus 로고    scopus 로고
    • On M2M technology and its security [J]
    • REN Wei, MA Liang-li, YE Min. On M2M Technology and Its Security [J]. Netinfo Security, 2012, 6-9(07).
    • (2012) Netinfo Security , vol.6-9 , Issue.7
    • Ren, W.1    Ma, L.-L.2    Ye, M.3
  • 12
    • 33745762364 scopus 로고    scopus 로고
    • An overview of database security [J]
    • WU Pufeng, ZHANG Yuqing. An Overview of Database Security [J]. Computer Engineering,2006,85-88(12).
    • (2006) Computer Engineering , vol.85-88 , Issue.12
    • Wu, P.1    Zhang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.