메뉴 건너뛰기




Volumn , Issue , 2014, Pages 9-14

Security analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT)

Author keywords

IEEE 802.15.4; Internet of Things; IoT IETF Standardization; IoT Protocol Stack; Security

Indexed keywords

MEDIUM ACCESS CONTROL; SECURITY OF DATA; STANDARDS;

EID: 84906739578     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIACS.2014.6861324     Document Type: Conference Paper
Times cited : (28)

References (28)
  • 1
    • 0033362595 scopus 로고    scopus 로고
    • The origins of ubiquitous computing research at PARC in the late 1980s
    • Dec.
    • M. Weiser, R. Gold, J. S. Brown, "The origins of ubiquitous computing research at PARC in the late 1980s", IBM Systems Journal, Vol. 38 No. 4, pp. 693-696, Dec. 1999.
    • (1999) IBM Systems Journal , vol.38 , Issue.4 , pp. 693-696
    • Weiser, M.1    Gold, R.2    Brown, J.S.3
  • 2
    • 75449104170 scopus 로고    scopus 로고
    • Smart objects as building blocks for the Internet of things
    • G. Kortuem, et al.: "Smart objects as building blocks for the Internet of things", IEEE Internet Computing, Vol. 14, No.1, pp. 44-51, 2009.
    • (2009) IEEE Internet Computing , vol.14 , Issue.1 , pp. 44-51
    • Kortuem, G.1
  • 3
    • 84855410073 scopus 로고    scopus 로고
    • Ubicomp systems at 20: Progress, opportunities, and challenges
    • Jan.
    • R. Caceres and A. Friday, "Ubicomp systems at 20: Progress, opportunities, and challenges", IEEE Pervasive Computing, Vol. 11, No. 1, pp. 14-21, Jan. 2012.
    • (2012) IEEE Pervasive Computing , vol.11 , Issue.1 , pp. 14-21
    • Caceres, R.1    Friday, A.2
  • 4
    • 80955160447 scopus 로고    scopus 로고
    • That 'Internet of Things' thing
    • [Online] June. (04-04-2014)
    • K. Ashton. "That 'Internet of Things' thing." RFID Journal.[Online] June 2009. Available: http://www.rfidjournal.com/article/view/ 4986 (04-04-2014)
    • (2009) RFID Journal
    • Ashton, K.1
  • 5
    • 48649100154 scopus 로고    scopus 로고
    • ITU internet reports 2005: The internet of things
    • Strategy, I. T. U., and Policy Unit
    • Strategy, I. T. U., and Policy Unit. "ITU Internet Reports 2005: The internet of things." Geneva: International Telecommunication Union (ITU) 2005.
    • (2005) Geneva: International Telecommunication Union (ITU)
  • 6
    • 84855778569 scopus 로고    scopus 로고
    • The internet of things - promise for the future? An introduction
    • May
    • L. Coetzee and J. Eksteen, "The Internet of Things - Promise for the Future? An Introduction", in IST-Africa Conference Proceedings, May 2011.
    • (2011) IST-Africa Conference Proceedings
    • Coetzee, L.1    Eksteen, J.2
  • 7
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • Oct.
    • L. Atzori, A. Iera and G. Morabito, "The Internet of Things: A Survey", Computer Networks, Vol. 54, No. 15, pp. 2787-2805, Oct. 2010.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 10
    • 50949122471 scopus 로고    scopus 로고
    • IETF, IETF [Online]. (17-04)
    • IETF, "The Internet Engineering Task Force", IETF [Online]. Available: http://www.ietf.org (17-04-2014).
    • (2014) The Internet Engineering Task Force
  • 14
    • 33751531045 scopus 로고    scopus 로고
    • Security services and enhancements in the IEEE 802.15.4 wireless sensor networks
    • Y. Xiao, S. Sethi, H.H. Chen, and B. Sun, "Security Services and Enhancements in the IEEE 802.15.4 Wireless Sensor Networks", in Proc. of IEEE GLOBECOM, vol.3, 2005.
    • (2005) Proc. of IEEE GLOBECOM , vol.3
    • Xiao, Y.1    Sethi, S.2    Chen, H.H.3    Sun, B.4
  • 15
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • W. Xu, K. Ma, W. Trappe, and Y. Zhang, "Jamming Sensor Networks: Attack and Defense Strategies", IEEE Network, vol.20, no.3, pp. 41-47, 2006.
    • (2006) IEEE Network , vol.20 , Issue.3 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 21
    • 84925368904 scopus 로고    scopus 로고
    • IEEE 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • Washington, DC, USA, August
    • J. Bellardo, S. Savage, "IEEE 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions", In Proceedings of the USENIX Security Symposium, Washington, DC, USA, August 2003.
    • (2003) Proceedings of the USENIX Security Symposium
    • Bellardo, J.1    Savage, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.